Telecom

Security gap allows eavesdropping on mobile phone calls

Calls via the LTE mobile network, also known as 4G, are encrypted and should therefore be tap-proof. However, researchers from the Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum have shown that this ...

Security

Expanding access to cyber research tools

Faculty and students at Purdue University now have access to cybersecurity research software developed at Sandia National Laboratories. This marks the first time Sandia has collaborated with an academic community to make ...

Official: US might help others buy non-Huawei telecom gear

The United States is willing to help other countries finance purchases of next-generation telecom technology from Western providers so they can avoid Chinese tech giant Huawei, which Washington sees as a security threat, ...

Business

US wants undersea data cable to skip Hong Kong

US Justice Department officials on Wednesday recommended that a high-capacity undersea data cable system proposed by Google and Facebook bypass Hong Kong, citing potential national security concerns following China's moves ...

Computer Sciences

Tightening up facial biometrics

Facial biometrics for security applications is an important modern technology. Unfortunately, there is the possibility of "spoofing" a person's face to the sensor or detection system through the use of a photograph or even ...

page 1 from 6