How easy is it to hack a cellular network
It was last year when a new method of attack on cellular networks was discovered. It requires neither costly radio scanners nor PC powerhouses and is available to virtually anyone.
94 articles
It was last year when a new method of attack on cellular networks was discovered. It requires neither costly radio scanners nor PC powerhouses and is available to virtually anyone.
Each year the number of people “addicted to Internet” grows rapidly. We can read news, communicate with friends, look through photos and videos right from our smartphones. It’s only logical,
While communication technology providers are seeking consensus over the future of 5G networks, carriers are wasting no time in rolling out new technologies available for the current 4G networks. Voice
British scientists proved that Android devices are highly dangerous when it comes to you and your data. It’s no joke — researchers at the University of Cambridge did serious research
What if you could be sure that your kids use Internet safely while their smartphones are protected from fraud, unwanted calls and SMS? Moreover, what if you could find your
As proven by Ed Snowden and Co., utopias are a myth. The anti-utopian storylines have been ingrained in our everyday lives. Technological progress brings a lot of magnificent things like
Despite our dismay in how much of a presence computers have in our kids’ lives (in all senses of the word), it is an unavoidable part of our evolution that
A worm was found in the safe garden of Apple. About 40 iOS apps are now being cleaned out of the App Store because they turned out to be infected
The new trend on IFA 2015 — a trade show for consumer electronics — is all about innovations in technological integrity. Developers chase after hardware superiority no more; instead they
While iOS is notorious for being innately secure, headlines over the past three days have challenged that. The noise was brought upon by a ‘terrible’ KeyRaider hack, which compromised more
Remember last year’s well-publicized leak, which exposed some celebrities’ nude photos? The story not only made some individuals’ day (and probably night), it turned to be a very educating precedent.
When you hear adults saying, “kids are helpless,” it makes you angry, right? You bet it does even if you are the most self-sustained teen in the history of your
The predictability of human beings can barely be overestimated. This predictability can be easily exploited when it comes to things like passwords, secret words, PIN codes and more. Many of
We all know that cybercriminals would love to infect your PC or Laptop with a virus or trick you to install a malware. What you might not know is that
Recently Ericsson and Qualcomm have begun promoting their state-of-art technology, LTE-U. Is it any better that LTE-A, which is increasingly available all over the world, including US, Europe, Russia, China
I am not a gambler, and it is not too easy to lure me into a dare. Yet, I could not resist it this time. A friend posed this bet
At the recent Google I/O conference, the ‘corporation of good’ announced (in addition to new Android versions, new services, and other predictable announcements), four new projects: Soli, Jacquard, Vault, and
How did you like it the last time you saw your friends? Did you have a nice chat with them? Or were you all only taking pictures of your meals
Threatpost journalists Chris Brook and Brian Donohue discuss security and privacy at Google I/O conference, the IRS and Carefirst BlueCross BlueShield Data Breach, Sections 215 of the PATRIOT Act and
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s