Researchers hack GSM mobile calls using $9 handsets

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Researchers hack GSM mobile calls using $9 handsets


Researchers hack GSM mobile calls using $9 handsets

Posted: 03 Jan 2011 08:00 AM PST


Researchers have demonstrated an alarmingly simple technique for eavesdropping on individual GSM mobile calls without the need to use expensive, specialised equipment.

Five 2010 stories that nobody predicted

Posted: 03 Jan 2011 08:00 AM PST


Welcome to 2011. Usually around this time of year, pundits guess what we'll be seeing in the year ahead. On the computer security front, we're hearing that 2011 will be the year of mobile malware, that criminals will take to the cloud, and that social network security is destined to become a bigger and bigger problem.

Avoiding "cloud anguish"

Posted: 03 Jan 2011 08:00 AM PST


We're already seeing a lot of "cloud anguish" from noted opinion makers. Many are suggesting that organizations who are dragging their feet about getting into cloud computing should consider so-called "private clouds" as a first step.

2011 tech priorities: Are you ready to flatten your data center network?

Posted: 03 Jan 2011 02:00 AM PST


As virtualization and the movement of virtual machines around the infrastructure accelerates, so too must your network.

The complicated new face of personal computing

Posted: 03 Jan 2011 02:00 AM PST


New platforms such as tablets and smartphones, loads of new virtualization technologies, and the need to access the desktop from any device, anywhere, forever change personal computing.

2011 tech priorities: Are you ready to shake things up?

Posted: 03 Jan 2011 08:00 AM PST


Concerns about the economy haven't evaporated, but companies aren't standing still waiting for a bailout. They're working to find new opportunities for growth. We've identified six key areas where IT can help reshape the business and equip employees to do their jobs more efficiently and effectively.

Intel's upcoming Core chips to secure streaming movies

Posted: 03 Jan 2011 08:00 AM PST


Intel on Monday said that it was building a hardware security layer in its next-generation Core chips to prevent streaming movies from being copied.

Chinese hackers dig into new IE bug, says Google researcher

Posted: 03 Jan 2011 08:00 AM PST


An accidental leak may have confirmed Chinese hackers' suspicions that Internet Explorer has a critical unpatched vulnerability, a security researcher said.

0 comments:

Post a Comment