Telecom

Security gap allows eavesdropping on mobile phone calls

Calls via the LTE mobile network, also known as 4G, are encrypted and should therefore be tap-proof. However, researchers from the Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum have shown that this ...

Software

Protection against terrorist attacks with homemade explosives

Terrorist attacks often feature the use of homemade explosives. For the police and security forces to be able to take appropriate precautions and assess the damage after an attack, they need access to the right kind of tools. ...

Ransomware criminals are targeting US universities

As COVID-19 cases in the U.S. continue to climb, government and higher education leaders have been focused on doing what it takes to protect campus communities from the global pandemic.

page 28 from 40