Weakness of 2G mobile phone networks revealed
Friday, October 21, 2016 - 07:01
in Mathematics & Economics
The encryption scheme used for second generation (2G) mobile phone data can be hacked within seconds by exploiting weaknesses and using common hardware, A*STAR researches show. The ease of the attack shows an urgent need for the 2G Global System for Mobile Communications (GSM) encryption scheme to be updated.