
“Research shows how much damage a bad actor can do with a rooted phone and a linked computer, disguising regular traffic to look like the new VoLTE protocols. Exploiting that vulnerability, Tu was able to dodge data charges, shut down a target’s data connection with a DDoS-like attack, or drive a victim’s data charges through the roof. Tu’s attacks work entirely within the cell network, setting them apart from normal internet-based exploits and letting them bypass traditional operator firewalls. The result for most exploits would be a simple loss of service, as high-priority signal traffic crowds out everything else arriving on the phone.”
http://www.theverge.com/2015/10/22/9594128/volte-vulnerability-attack-verizon-att-tmobile
Related posts:
Peter Schiff: Death of a Patriot
Bloomberg News Used Its Private Data to Spy on Geithner and Bernanke
How the Government Hides Secret Surveillance Programs
No Warrant Needed for Illinois Drug Wiretaps
Median CPI Up 0.1% in October
Double Tap Drones: What Has Happened to the United States?
Lamassu: Bitcoin ATM Machine
A Sign of the Apocalypse? The French and Italians Are More Fiscally Conservative than Americans!
‘Stripe’ Lead Engineer: Bitcoin is a Long-Term Investment
New Hampshire General Assembly Approves Marijuana Legalization
Idaho Deputy Gets the Boot for Criticizing Megaload Ticket Blitz
The EU Eats Itself
Former Mich. mayor sets bronze statue of himself outside home
Banana Republics Have Nothing on New York City
Obama Narrows Field for Fed Chairman to 3