Skip to main content

How Easy Can Someone Know Where You Are Through Your Phone?

Mobile Network Standard That Affects Us All

Because many of us have smartphones, the target on our backs is bigger than ever. Hackers, even nation states, are targeting smartphones to tap into cameras and microphones, but crucially and most of all, your data including your geo-location data.

Asymmetric Threats in Cybersecurity

Asymmetric Threat

The concept of “asymmetric threat” has its root from the military [1].  The asymmetric threat is defined as an attempt to circumvent or undermine an opponent’s strengths while exploiting the weakness, using methods that differ significantly from the opponent’s usual mode of operations.   

Subscribe to Cyber Security