
“Research shows how much damage a bad actor can do with a rooted phone and a linked computer, disguising regular traffic to look like the new VoLTE protocols. Exploiting that vulnerability, Tu was able to dodge data charges, shut down a target’s data connection with a DDoS-like attack, or drive a victim’s data charges through the roof. Tu’s attacks work entirely within the cell network, setting them apart from normal internet-based exploits and letting them bypass traditional operator firewalls. The result for most exploits would be a simple loss of service, as high-priority signal traffic crowds out everything else arriving on the phone.”
http://www.theverge.com/2015/10/22/9594128/volte-vulnerability-attack-verizon-att-tmobile
Related posts:
We Are Becoming a Nation of Burger Flippers
11 GOP convention speakers who actually ‘didn’t build that’
CDC: Painkillers Kill Four Times More than Cocaine and Heroin Combined
Rand Paul slams Obama’s plans for military involvement in Syria
Auto Lenders Taking More Risks: Longer-Term, Higher Balances, Lower Quality
Holograms, bio-sensors will change how you shop: Intel
FAA begins granting drone overflight waivers to large corporations
The Road to World Government, World Police, World Tyranny
Muslim community ‘vindicated’ after NYPD spy program produced no leads
Hunt for Silk Road users and Bitcoin fortunes intensifies
JPMorgan Chase Bans Storage of Cash in its Safety Deposit Boxes
Mt. Gox Settlement Proposal Could Make Former Users Whole
Summers vs. Yellen: Tweedledumb vs. Tweedledee
A Regional FED President Says the FED Is Not Inflating Enough.
Send Micro-Transactions With Zero Fees via Coinbase