
“Research shows how much damage a bad actor can do with a rooted phone and a linked computer, disguising regular traffic to look like the new VoLTE protocols. Exploiting that vulnerability, Tu was able to dodge data charges, shut down a target’s data connection with a DDoS-like attack, or drive a victim’s data charges through the roof. Tu’s attacks work entirely within the cell network, setting them apart from normal internet-based exploits and letting them bypass traditional operator firewalls. The result for most exploits would be a simple loss of service, as high-priority signal traffic crowds out everything else arriving on the phone.”
http://www.theverge.com/2015/10/22/9594128/volte-vulnerability-attack-verizon-att-tmobile
Related posts:
Bitcoin Arcade Machine is ‘On Like Donkey Kong’
Gamers Hit with Criminal Charges for Cheating Online
Role of the Alternative Media in Covering Cannabis Legalization
Under the Microscope: The Real Costs of a Dollar
Living on Bitcoin is a real challenge for newlywed couple
Housing’s Mini-Bubble Has Popped.
Shock Video: Cop Protects First Amendment In Airport
Dubai: 400 fully operational Bitcoin ATMs in the next two weeks
Netherlands Bar Accepts Bitcoins For Beer With New POS System
Massive security hole lets hackers control millions of cameras, printers and routers
Hightailing It Out of High-Tax States
Justice Achieved: Coffee Mug Threat Is Halted by State Attorneys General.
Cyprus: 16 months of capital controls, banks still pitifully capitalized
A Second Passport: Outsmart the TSA
IRS Seized $17 Million From Innocent Business Owners Using Asset Forfeiture