
“Research shows how much damage a bad actor can do with a rooted phone and a linked computer, disguising regular traffic to look like the new VoLTE protocols. Exploiting that vulnerability, Tu was able to dodge data charges, shut down a target’s data connection with a DDoS-like attack, or drive a victim’s data charges through the roof. Tu’s attacks work entirely within the cell network, setting them apart from normal internet-based exploits and letting them bypass traditional operator firewalls. The result for most exploits would be a simple loss of service, as high-priority signal traffic crowds out everything else arriving on the phone.”
http://www.theverge.com/2015/10/22/9594128/volte-vulnerability-attack-verizon-att-tmobile
Related posts:
Doug Casey: “We’re Still In The Midst Of The Biggest Bubble In World History”
Marc Faber's forecasts for the global economy
Jeffrey Tucker: Bitcoin In Depth
The Strange Case of Lagarde, Influence Peddling and the IMF
James Kaleda ejected from gun control hearing by NJ State Troopers
Once Again, Activists Must Beg the Government to Preserve the Right to Repair
China’s new anti-terror law copies West, with decryption on demand
Pakistan bans BlackBerry messaging, e-mail for “security reasons”
Govt Lawyers: Americans Have No Right to Challenge Surveillance
Bill O’Reilly suddenly opposed to NSA surveillance he supported under Bush
Crashes of Convenience: Michael Hastings
Amazon is selling police departments a real-time facial recognition system
After JFK was killed, Truman letter called for the abolition of CIA covert ops
Napster Documentarian’s Next Project: The Untold Story of Bitcoin
So Much Cool Science Happening In The Marijuana Industry These Days