
“Research shows how much damage a bad actor can do with a rooted phone and a linked computer, disguising regular traffic to look like the new VoLTE protocols. Exploiting that vulnerability, Tu was able to dodge data charges, shut down a target’s data connection with a DDoS-like attack, or drive a victim’s data charges through the roof. Tu’s attacks work entirely within the cell network, setting them apart from normal internet-based exploits and letting them bypass traditional operator firewalls. The result for most exploits would be a simple loss of service, as high-priority signal traffic crowds out everything else arriving on the phone.”
http://www.theverge.com/2015/10/22/9594128/volte-vulnerability-attack-verizon-att-tmobile
Related posts:
The Ongoing Implosion of Venezuelan Statism
Two women sue Texas Troopers for illegal roadside cavity search
Short Video: Canadian Wait Times for Surgery; America’s Future
US International Capital Flows
The Age of Bitcoin: Why Bitcoin Will Be Huge
Feds May Cut Off Water For Legal Marijuana Crops
Grasshopper flies again, sets new altitude record
Sign of the Times: Misdirected Apology!
'I Am a Watertown Resident...'
Government Fees, Parking Tickets May Soon Be Paid in Bitcoin
Iraq deaths reportedly over a million
Maryland: Another City Forced To Refund Illegal Photo Tickets
US Treasury denies it is trying to torpedo Bitcoin
Who controls the cop cam?
Why Clipperz is moving out of US