Interesting Attack on the EMV Smartcard Payment Standard

It’s complicated, but it’s basically a man-in-the-middle attack that involves two smartphones. The first phone reads the actual smartcard, and then forwards the required information to a second phone. That second phone ...

Recovering Smartphone Typing from Microphone Sounds

Yet another side-channel attack on smartphones: "Hearing your touch: A new acoustic side channel on smartphones," by Ilia Shumailov, Laurent Simon, Jeff Yan, and Ross Anderson. Abstract: We present the first acoustic ...

Smartphones that talk too much

In brief, the idea is that the phone's 'acoustic signature' can be used to determine the device users' password when they unlock the phone ...

Apple to make life easier for law enforcement

| | Apple, law enforcement, passwords, pins
Apple has experienced much friction with law-enforcement regarding information sharing and access to suspects' devices. Will provision of a formal procedure reduce that friction? ...