Friday, 27 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Innovations > University of Birmingham develop new method to combat phone hacking
Innovations

University of Birmingham develop new method to combat phone hacking

Last updated: January 26, 2024 12:34 pm
Published January 26, 2024
Share
phone hacking
SHARE

Experts at the University of Birmingham have innovated a new strategy to protect users from phone hacking attacks.

In a world dominated by mobile technology, computer science researchers have made significant strides in identifying and addressing security vulnerabilities that make individuals susceptible to account takeover attacks.

As mobile devices become increasingly interconnected, the risks of exploitation by hackers have grown substantially, leading to dire consequences for users.

Dr Luca Arnaboldi, in collaboration with Professor David Aspinall of the University of Edinburgh, Dr Christina Kolb, University of Twente, and Dr Sasa Radomirovic, University of Surrey, has developed a pioneering method to catalogue security vulnerabilities and model account takeover attacks.

This breakthrough involves breaking down complex attacks into their fundamental building blocks, providing a more granular understanding of phone hacking strategies.

Identifying security vulnerabilities

Traditional approaches to studying security vulnerabilities have relied on ‘account access graphs,’ illustrating stages of access involving the phone, SIM card, apps, and security features.

However, these graphs fall short in modelling account takeovers, where an attacker disconnects a device or app from the account ecosystem, creating new opportunities for exploitation.

Innovative modelling to combat phone hacking

The research team’s novel method, grounded in the formal logic used by mathematicians and philosophers, captures the decision points faced by a hacker with access to a mobile phone and PIN.

This approach offers a comprehensive view of how account access changes as devices, SIM cards, or apps are disconnected from the account ecosystem, providing more accurate insights into potential vulnerabilities.

© shutterstock/Maksim Shmeljov

Industry implications

The researchers anticipate widespread adoption of their approach by device manufacturers and app developers. This method promises to help catalogue vulnerabilities and deepen the understanding of intricate phone hacking attacks, empowering the industry to proactively enhance security measures.

See also  New device simplifies manipulation of 2D materials for twistronics

In addition to theoretical advancements, the researchers tested their approach against claims made in a Wall Street Journal report. The report suggested that an attack strategy used on an iPhone could be replicated on an Android.

However, the researchers found that Android’s installation process, requiring a Google account, added an extra layer of protection against attacks. This work also led to a security fix implemented by Apple for iPhones.

Manufacturer-specific vulnerabilities

Extending their analysis to various devices, including Motorola G10 Android 11, Lenovo YT-X705F Android 10, Xiaomi Redmi Note Pro 10 Android 11, and Samsung Galaxy Tab S6 Lite Android, the researchers discovered vulnerabilities in devices with their own manufacturer accounts, such as Samsung and Xiaomi.

While Google accounts remained secure, bespoke manufacturer accounts were found to be compromised.

The researchers also applied their method to test the security of their own mobile devices. One researcher discovered that sharing access to a shared iCloud account with his wife compromised his security.

Despite robust security measures on his end, his wife’s chain of connections posed a potential risk, highlighting the need for users to be vigilant even in seemingly secure setups.

This work highlights the urgent need to secure mobile devices and protect users from evolving cyber threats, marking a crucial step forward in the ongoing battle against phone hacking.

Subscribe to our newsletter

Source link

TAGGED: Birmingham, Combat, develop, hacking, method, phone, University
Share This Article
Twitter Email Copy Link Print
Previous Article A picture taken in 2020 shows a zooming effect of LEDs on network infrastructure at the datacenter of French mobile communications company SFR in Cesson-sevigne, in the suburbs of Rennes, western France. Why Mississippi data center projects could mean future new business, jobs
Next Article Data center in AI How the demands of AI are impacting data centers and what operators can do
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Swisscom Boosts Customer Service and Sustainability with Genesys Cloud

Swisscom, Switzerland’s largest telecommunications supplier, is making vital strides in enhancing buyer and worker experiences…

April 29, 2024

How Cisco builds smart systems for the AI era

Among the many massive gamers in know-how, Cisco is likely one of the sector’s leaders…

February 5, 2026

Google says Chrome can now protect you better while preserving your privacy

Google has added real-time looking safety to Chrome that it claims ought to defend your…

March 14, 2024

Advance in light-based computing shows capabilities for future smart cameras

This experimental gadget makes use of a 2D semiconductor materials developed by Xiangfeng Duan, UCLA…

April 29, 2024

Kaspersky no longer on Google Play Store anywhere following US ban

Citing US restrictions, Google eliminated Kaspersky Lab’s antivirus software program from the Play Retailer and…

October 8, 2024

You Might Also Like

Fuelling defence goals with compound semiconductors from South Wales
Innovations

Fuelling defence goals with compound semiconductors

By saad
X-ray breakthrough enables real-time monitoring of electronic chips
Innovations

X-ray breakthrough enables real-time monitoring of electronic chips

By saad
AI could accurately deliver flood warnings in data-scarce regions
Innovations

AI could accurately deliver flood warnings in data-scarce regions

By saad
ARCHER2 supercomputer
Innovations

ARCHER2 supercomputer generates £4.2bn for UK economy

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.