Saturday, 7 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Innovations > University of Birmingham develop new method to combat phone hacking
Innovations

University of Birmingham develop new method to combat phone hacking

Last updated: January 26, 2024 12:34 pm
Published January 26, 2024
Share
phone hacking
SHARE

Experts at the University of Birmingham have innovated a new strategy to protect users from phone hacking attacks.

In a world dominated by mobile technology, computer science researchers have made significant strides in identifying and addressing security vulnerabilities that make individuals susceptible to account takeover attacks.

As mobile devices become increasingly interconnected, the risks of exploitation by hackers have grown substantially, leading to dire consequences for users.

Dr Luca Arnaboldi, in collaboration with Professor David Aspinall of the University of Edinburgh, Dr Christina Kolb, University of Twente, and Dr Sasa Radomirovic, University of Surrey, has developed a pioneering method to catalogue security vulnerabilities and model account takeover attacks.

This breakthrough involves breaking down complex attacks into their fundamental building blocks, providing a more granular understanding of phone hacking strategies.

Identifying security vulnerabilities

Traditional approaches to studying security vulnerabilities have relied on ‘account access graphs,’ illustrating stages of access involving the phone, SIM card, apps, and security features.

However, these graphs fall short in modelling account takeovers, where an attacker disconnects a device or app from the account ecosystem, creating new opportunities for exploitation.

Innovative modelling to combat phone hacking

The research team’s novel method, grounded in the formal logic used by mathematicians and philosophers, captures the decision points faced by a hacker with access to a mobile phone and PIN.

This approach offers a comprehensive view of how account access changes as devices, SIM cards, or apps are disconnected from the account ecosystem, providing more accurate insights into potential vulnerabilities.

© shutterstock/Maksim Shmeljov

Industry implications

The researchers anticipate widespread adoption of their approach by device manufacturers and app developers. This method promises to help catalogue vulnerabilities and deepen the understanding of intricate phone hacking attacks, empowering the industry to proactively enhance security measures.

See also  Microsoft announces its own Black Hat-like hacking event with big rewards for AI security

In addition to theoretical advancements, the researchers tested their approach against claims made in a Wall Street Journal report. The report suggested that an attack strategy used on an iPhone could be replicated on an Android.

However, the researchers found that Android’s installation process, requiring a Google account, added an extra layer of protection against attacks. This work also led to a security fix implemented by Apple for iPhones.

Manufacturer-specific vulnerabilities

Extending their analysis to various devices, including Motorola G10 Android 11, Lenovo YT-X705F Android 10, Xiaomi Redmi Note Pro 10 Android 11, and Samsung Galaxy Tab S6 Lite Android, the researchers discovered vulnerabilities in devices with their own manufacturer accounts, such as Samsung and Xiaomi.

While Google accounts remained secure, bespoke manufacturer accounts were found to be compromised.

The researchers also applied their method to test the security of their own mobile devices. One researcher discovered that sharing access to a shared iCloud account with his wife compromised his security.

Despite robust security measures on his end, his wife’s chain of connections posed a potential risk, highlighting the need for users to be vigilant even in seemingly secure setups.

This work highlights the urgent need to secure mobile devices and protect users from evolving cyber threats, marking a crucial step forward in the ongoing battle against phone hacking.

Subscribe to our newsletter

Source link

TAGGED: Birmingham, Combat, develop, hacking, method, phone, University
Share This Article
Twitter Email Copy Link Print
Previous Article A picture taken in 2020 shows a zooming effect of LEDs on network infrastructure at the datacenter of French mobile communications company SFR in Cesson-sevigne, in the suburbs of Rennes, western France. Why Mississippi data center projects could mean future new business, jobs
Next Article Data center in AI How the demands of AI are impacting data centers and what operators can do
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Industry Report Reveals Shift Towards Hybrid IT, Colocation

CoreSite, a hybrid IT options supplier and subsidiary of American Tower Company, launched its 2024…

July 16, 2024

Turning pollution into clean fuel with stable methane production from carbon dioxide

The CO2 to hydrocarbon conversion course of utilizing totally different methods. Credit score: Nature Power…

October 25, 2025

Aetina introduces edge AI for transport and public safety at smart city event

Aetina, a supplier of AI options, will showcase its edge AI options on the Smart…

October 28, 2024

Researchers invent intelligent soft robotic clothing for automatic thermal adaptation in extreme heat

A workforce led by Dr Dahua Shou, Limin Endowed Younger Scholar in Superior Textiles Applied…

August 14, 2024

Google ushers in the agentic AI era

Google CEO Sundar Pichai has introduced the launch of Gemini 2.0, a mannequin that represents…

December 11, 2024

You Might Also Like

CardLab launches world-first FIDO-certified biometric card
Innovations

CardLab launches world-first FIDO-certified biometric card

By saad
High-performance large language models for Europe
Innovations

High-performance large language models for Europe

By saad
An Estonian large language model for sovereign AI infrastructure
Innovations

An Estonian large language model for sovereign AI infrastructure

By saad
Livermore Computing: Accelerating excellence in HPC
Innovations

Livermore Computing: Accelerating excellence in HPC

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.