mobile network security

Satellite phone communications encrypted with the GMR-2 cipher can be decrypted in mere fractions of a second, two Chinese researchers have proved. The GMR-2 is a stream cipher with 64-bit key-length. Currently, the phones of British satellite telecom Inmarsat use

In a recent incident, internet service providers such as Tata Communications, Airtel and Vodafone in Mumbai, Maharashtra and other regions were hit by cyberattacks in July. “A case has been reported of Distributed Denial of Service (DDoS) attack on July

Barclays has announced that its personal banking customers will, starting this week, be able to use voice security technology over passwords. This would help customers avoid the need to answer various questions over the telephone to gain access to their

We’re all familiar with the SMS text message based security codes used as a security feature by huge numbers of websites from social networks to email to online payments. This is the feature that aims to verify your identity after

WASHINGTON, D.C. — On Nov. 26, 2008, when terrorists launched multiple coordinated attacks across Mumbai, India’s largest city, the bad guys at one point walked right past what would have been a choice target — one of the major cable

Criminal developers have created a new evil way to monetise their operations by adding a DDoS component to ransomware payloads. The malicious new double-barrelled ransomware was discovered by security firm Invincea. Instead of ‘just’ encrypting data files on a workstation (plus

DALLAS, Texas, June 6, 2016 /PRNewswire/ — AT&T* is now working with Nokia to expand our 5G lab trial work.  In addition to the 5G trial we are doing in Austin, Texas, we have also begun system and software architecture lab

When it comes to security, most mobile devices are a target waiting to be attacked. That’s pretty much the conclusion of a report to Congress on the status of the security of mobile devices this week by watchdogs at the