Asian Surveying & Mapping
Breaking News
High-resolution spatial maps to assess climate-related shocks
Insurance companies and governments worldwide are increasingly using spatial...
Aurecon strengthens digital offering in Greater China to help clients future-proof their infrastructure
Hong Kong – As businesses across Asia continue to...
Synspective and GCRS Announce Partnership for SAR Satellite-Based Risk Analysis Solutions in South Asia
Geo Climate Risk  Solutions Pvt. Ltd. (GCRS), a solution...
Teledyne Optech Galaxy T2000 mobilized for earthquake recovery and reconstruction effort in China
Vaughan, Ontario, CANADA – Teledyne Geospatial announced that the State...
Presagis Teams with Kambill Systems to Provide Artificial Intelligence-Based Geospatial Services in Asia Pacific
First two Contracts Awarded by Indian National Survey Agency/State...
Synspective and GCRS Announce Partnership for SAR Satellite-Based Risk Analysis Solutions in South Asia
2022 November 15, Tokyo – Geo Climate Risk Solutions...
Fugro opens state-of-the-art space control centre SpAARC in Perth
Fugro has officially opened the Australian Space Automation, Artificial...
Chinese scientists create new detailed map of moon rocks
BEIJING - Chinese scientists have created a high-resolution map...
Russia and Iran expand space cooperation
Russia and Iran are gradually expanding their cooperation in...
Korea bolsters spatial data cooperation with Tanzania, Ethiopia
The government will help Tanzania and Ethiopia with effective...

July 27th, 2012
GPS Weakness Could Enable Mass Smartphone Hacking

Weaknesses in the technology that allows smartphone users to pinpoint themselves on a map, or check into restaurants and bars using apps such as Foursquare, could allow those users to be tracked remotely. Ralf-Philipp Weimann, a researcher at the University of Luxembourg, reported this finding at the Black Hat computer security conference in Las Vegas yesterday. He believes that the complex mechanism by which phones get location fixes likely also hides vulnerabilities that could allow the mechanism to be used to install and run malicious code on the device. Read More