25 articles
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
We discuss what public IPs are, why you might need one, and the risks involved in using them.
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
The very word automobile means self-moving. Through their history of more than a century, automobiles have evolved, increasingly taking over the driving process from humans. Many years ago, the car
Last week Facebook posted a video of its solar-powered Aquila drone’s inaugural flight. The aircraft’s design is of flying wing type, with a wingspan close to that of Boeing 737,
In one of the previous installments of our GSM saga we mentioned an urban legend of hijacking encryption keys on the fly. It presupposes someone can clone your SIM card
Recently engineers who have been working to improve legacy cellular technologies, were stricken with a thought: “Why would one need a SIM card, if it’s nothing more than a protected data
Recently Samsung introduced the Gear S2 Classic 3G smart watch, which is the first device with eSIM support. Although it is a pilot, this technology is bound to spark a
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same
It was last year when a new method of attack on cellular networks was discovered. It requires neither costly radio scanners nor PC powerhouses and is available to virtually anyone.
Every time there is a plane crash, there is typically a lot of publicity. Without doubt, armchair pilots and safety experts come out of the woodwork. Every last one of
Checking in to an airport to brag that you are on your way to a Parisian getaway is so yesterday. For starters Swarm has lost it’s luster and usage since
We are still in the midst of the smartphone boom. Over the past couple of years, over 50% of all mobile devices used by consumers are smartphones. In turn, this
The new trend on IFA 2015 — a trade show for consumer electronics — is all about innovations in technological integrity. Developers chase after hardware superiority no more; instead they
In-flight security made quite a lot of headlines earlier this summer, but this time at unusual angle. Aviation has always been focused on safety and had remained the most secure
Recently Ericsson and Qualcomm have begun promoting their state-of-art technology, LTE-U. Is it any better that LTE-A, which is increasingly available all over the world, including US, Europe, Russia, China
At the recent Google I/O conference, the ‘corporation of good’ announced (in addition to new Android versions, new services, and other predictable announcements), four new projects: Soli, Jacquard, Vault, and
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s
When you look at airplanes moving on a map, using some tracking service like Flightradar24, you get the feeling it’s sheer Brownian motion. It may look like an abundance of aircrafts