“Research shows how much damage a bad actor can do with a rooted phone and a linked computer, disguising regular traffic to look like the new VoLTE protocols. Exploiting that vulnerability, Tu was able to dodge data charges, shut down a target’s data connection with a DDoS-like attack, or drive a victim’s data charges through the roof. Tu’s attacks work entirely within the cell network, setting them apart from normal internet-based exploits and letting them bypass traditional operator firewalls. The result for most exploits would be a simple loss of service, as high-priority signal traffic crowds out everything else arriving on the phone.”
http://www.theverge.com/2015/10/22/9594128/volte-vulnerability-attack-verizon-att-tmobile
Related posts:
The Ever-Growing Insanity of Venezuelan Exchange Controls
Calls to Congress 499 to 1 against Syria war
Bitcoin Survival Guide: Everything You Need About the Future of Money
Bitcoin Price Hits $1,000 After Doubling in 7 Days. What Next?
Komen for the Cure's agenda of deception blasted by British scientists
Vault of Satoshi expands Canadian bitcoin exchange market
Task force: Tourists welcome to get stoned in Colorado
Chinese Hotel: 6 Days to Build
Michigan: Municipalities Ignoring Voters' Will Regarding Marijuana Liberalization Measures
Amnesty’s Shilling for US Wars
Hemingway Museum Needs USDA Zoo License for Cats
How the Government Tracks You: NSA Surveillance
Texas vs. California
Virginia: $10 Million Red Light Camera Caught With Short Yellow
Illinois Lies