Security

Encrypting images chaotically

An artificial neural network approach to image encryption offers many advantages over conventional encryption methods suggests a review published in the International Journal of Services Operations and Informatics. Shaimaa ...

Telecom

Security gap allows eavesdropping on mobile phone calls

Calls via the LTE mobile network, also known as 4G, are encrypted and should therefore be tap-proof. However, researchers from the Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum have shown that this ...

page 9 from 15