
“Research shows how much damage a bad actor can do with a rooted phone and a linked computer, disguising regular traffic to look like the new VoLTE protocols. Exploiting that vulnerability, Tu was able to dodge data charges, shut down a target’s data connection with a DDoS-like attack, or drive a victim’s data charges through the roof. Tu’s attacks work entirely within the cell network, setting them apart from normal internet-based exploits and letting them bypass traditional operator firewalls. The result for most exploits would be a simple loss of service, as high-priority signal traffic crowds out everything else arriving on the phone.”
http://www.theverge.com/2015/10/22/9594128/volte-vulnerability-attack-verizon-att-tmobile
Related posts:
US Weapon Stockpile Used by ISIS Found in Syria
Hackers selling access to airport security systems for $10
Edward Snowden Receives German Whistleblowing Award
Trump’s Department of Justice just reopened business for private prisons
Adam Kokesh & Ron Paul vs Peter Schiff on Statism vs Voluntaryism
Bovard: The Daily Hell of Life in the Soviet Bloc
Incoming CIA Director John Brennan refuses to say whether waterboarding is torture
Russia To West: We Told You Not To Overthrow Qaddafi!
Glenn Greenwald: Embassy closings looks like a conspiracy to silence NSA debate
Boy clinging to his dead father at wedding: the face of US-backed Yemen war
Income, Sales, Gas, Vehicle, and Alcohol Taxes Hit All-Time Highs
Air Force erases drone strike data amid criticisms
Why Have Police In America Turned Into Such Ruthless Thugs?
Satoshi Forest, Nine-Acre Sanctuary for the Homeless
Senate Votes To Turn NSA Spying Back On, But With Reforms