CAP Anomaly Spotter for Security and Much More
CAP Data Technologies teamed up with researchers from University of Jyväskylä to automatically process medieval magic texts. The goal of the project was to identify similarities between documents, namely alchemical instructions from old books written in the Latin language.
The texts were prepared by Lauri Ockenström, researcher at the Department of Music, Art and Culture Studies. His research interests include imagery of magic and astrology, renaissance magic, hermetic tradition and history of occultism.Read more..
Internet of things phenomenon has brought countless new connecting devices to mobile networks and the trend will most likely continue in the future. The fact that IoT devices are often designed to have low computational capacity to achieve as small power consumption as possible, combined with poor design choices in many of the early IoT devices, has lead to IoT having a bad reputation on the security front.
In this post we will explore what is the current state of IoT security and how mobile network operators can help IoT devices to achieve security while maintaining desirable power consumption.Read more..
In our previous blog post we laid out some of the attacks that are very much possible in the world of mobile networking. To succeed on these the attacker must conduct some research in advance about the victim. One of the important details to know is it victims International Mobile Subscriber Identity aka. IMSI. It is globaly unique identifier from witch it is possible to discover on which operators network the subscriber is. Next we’ll go over a few means to aquire that information.Read more..