Sunday, 14 Dec 2025
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Innovations > University of Birmingham develop new method to combat phone hacking
Innovations

University of Birmingham develop new method to combat phone hacking

Last updated: January 26, 2024 12:34 pm
Published January 26, 2024
Share
phone hacking
SHARE

Experts at the University of Birmingham have innovated a new strategy to protect users from phone hacking attacks.

In a world dominated by mobile technology, computer science researchers have made significant strides in identifying and addressing security vulnerabilities that make individuals susceptible to account takeover attacks.

As mobile devices become increasingly interconnected, the risks of exploitation by hackers have grown substantially, leading to dire consequences for users.

Dr Luca Arnaboldi, in collaboration with Professor David Aspinall of the University of Edinburgh, Dr Christina Kolb, University of Twente, and Dr Sasa Radomirovic, University of Surrey, has developed a pioneering method to catalogue security vulnerabilities and model account takeover attacks.

This breakthrough involves breaking down complex attacks into their fundamental building blocks, providing a more granular understanding of phone hacking strategies.

Identifying security vulnerabilities

Traditional approaches to studying security vulnerabilities have relied on ‘account access graphs,’ illustrating stages of access involving the phone, SIM card, apps, and security features.

However, these graphs fall short in modelling account takeovers, where an attacker disconnects a device or app from the account ecosystem, creating new opportunities for exploitation.

Innovative modelling to combat phone hacking

The research team’s novel method, grounded in the formal logic used by mathematicians and philosophers, captures the decision points faced by a hacker with access to a mobile phone and PIN.

This approach offers a comprehensive view of how account access changes as devices, SIM cards, or apps are disconnected from the account ecosystem, providing more accurate insights into potential vulnerabilities.

© shutterstock/Maksim Shmeljov

Industry implications

The researchers anticipate widespread adoption of their approach by device manufacturers and app developers. This method promises to help catalogue vulnerabilities and deepen the understanding of intricate phone hacking attacks, empowering the industry to proactively enhance security measures.

See also  Flexible perovskite device achieves optical logic emission for motion capture and stress sensing

In addition to theoretical advancements, the researchers tested their approach against claims made in a Wall Street Journal report. The report suggested that an attack strategy used on an iPhone could be replicated on an Android.

However, the researchers found that Android’s installation process, requiring a Google account, added an extra layer of protection against attacks. This work also led to a security fix implemented by Apple for iPhones.

Manufacturer-specific vulnerabilities

Extending their analysis to various devices, including Motorola G10 Android 11, Lenovo YT-X705F Android 10, Xiaomi Redmi Note Pro 10 Android 11, and Samsung Galaxy Tab S6 Lite Android, the researchers discovered vulnerabilities in devices with their own manufacturer accounts, such as Samsung and Xiaomi.

While Google accounts remained secure, bespoke manufacturer accounts were found to be compromised.

The researchers also applied their method to test the security of their own mobile devices. One researcher discovered that sharing access to a shared iCloud account with his wife compromised his security.

Despite robust security measures on his end, his wife’s chain of connections posed a potential risk, highlighting the need for users to be vigilant even in seemingly secure setups.

This work highlights the urgent need to secure mobile devices and protect users from evolving cyber threats, marking a crucial step forward in the ongoing battle against phone hacking.

Subscribe to our newsletter

Source link

TAGGED: Birmingham, Combat, develop, hacking, method, phone, University
Share This Article
Twitter Email Copy Link Print
Previous Article A picture taken in 2020 shows a zooming effect of LEDs on network infrastructure at the datacenter of French mobile communications company SFR in Cesson-sevigne, in the suburbs of Rennes, western France. Why Mississippi data center projects could mean future new business, jobs
Next Article Data center in AI How the demands of AI are impacting data centers and what operators can do
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Amazon Pledges to Continue Rapid Data Center Expansion

(Bloomberg) -- Amazon’s cloud companies chief says the corporate is aggressively increasing server farms globally…

May 31, 2025

GoldState Music Raises US$500M in Strategic Capital

GoldState Music, a West Palm Seashore, FL-based premier music rights funding platform, raised US$500 million…

April 21, 2025

Anbogen Therapeutics Raises USD 7.5M in Series A+ Funding

Anbogen Therapeutics, Inc., a Taipei, Taiwan-based clinical-stage firm creating most cancers therapies, raised USD 7.3M…

July 1, 2024

Cloud-based GPU savings are real – for the nimble

Cloud-based GPU computing has dropped in value over the previous yr, and actual financial savings…

November 12, 2025

Energy Efficiency Not Enough in Push for Data Center Sustainability

This article originally appeared in Light Reading.Power effectivity is a part of the answer to…

July 18, 2024

You Might Also Like

semiconductor manufacturing
Innovations

EU injects €623m to boost German semiconductor manufacturing

By saad
Siemens, nVent develop blueprint for NVIDIA AI data centres
Global Market

Siemens, nVent develop blueprint for NVIDIA AI data centres

By saad
NanoIC pilot line: Accelerating beyond-2nm chip innovation
Innovations

NanoIC pilot line: Accelerating beyond-2nm chip innovation

By saad
How biometrics secure our online world
Innovations

How biometrics secure our online world

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.