SBA Research is a research center for Information Security funded partly by the national initiative for COMET Competence Centers for Excellent Technologies.
In mid-May, Jeanine Lefèvre, head of Office of Equal Opportunities at SBA Research, attended the important Viennese conference on Excellent research requires the right framework which set the tone for non-discriminatory research. Around 80 experts in science, politics, and gender equality came together to discuss strategies for… Read More
At the end of January, Shecurity – Women in Security visited the Austrian Armed Forces and was given an exclusive insight into the Military Cyber Center by Lambert Scharwitzl. Afterwards, the group watched the talk “We Know Where… Read More
We are proud to share that Shecurity has been honored with the Women in Tech Community Initiative of the Year award for 2024 in December! ... Read More
On December 9, 2024, the “𝗱𝗶𝗲 𝗜𝗧-𝗧𝗮𝗴“, inspiring women from the IT field dedicated their time to meet with thousands of enthusiastic high and middle school students across Austria. At SBA Research, we are incredibly proud to have supported this one-of-a-kind initiative from its early days,… Read More
The best digitalization projects from business and administration were honoured at the eAward 2024 business prize ceremony and we are proud to announce that Shecurity - Hackerinnen Training won the eAward 2024 in the category "Education and Social"! ... Read More
Yesterday evening, the sec4dev Conference & Bootcamp, hosted the special event Women in IT – we are no Aliens! – with 50+participants including SBA’s Stephanie Jakoubi, Johanna Ullrich and… Read More
Together with sipgate and ISMK Stralsund, Gabriel Gegenhuber, researcher at SBA Research and University of Vienna, and Michael Pucher, researcher at SBA research, discovered and investigated a vulnerability in the Voice of LTE (VoLTE) stack that is broadly used within MediaTek-based smartphones. ∞
In the Mediatek modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. ∞