Weakness of 2G mobile phone networks revealed

The encryption scheme used for second generation (2G) mobile phone data can be hacked within seconds by exploiting weaknesses and using common hardware, A*STAR researches show. The ease of the attack shows an urgent need ...

No warrant needed to get cell phone location: US court

Police don't need a warrant to obtain mobile phone location data for a criminal investigation, a US appeals court ruled Tuesday in a case closely watched for digital-era privacy implications.

Using cellphone data to study the spread of cholera

While cholera has hardly changed over the past centuries, the tools used to study it have not ceased to evolve. Using mobile phone records of 150,000 users, an EPFL-led study has shown to what extent human mobility patterns ...

Schumer: Probe billboards using phone data to track shoppers

An outdoor advertising company that owns thousands of billboards across the country, including in Times Square, and around the world, is using mobile phone data to learn about people who are passing their displays in order ...

Peak friendship—data reveals when you'll be most popular

Making friends can seem easy when you're young. You encounter more new people and have more free time when you're first venturing out into the world than when you're more likely to be settled down with a steady job, a long-term ...

page 6 from 16