“Research shows how much damage a bad actor can do with a rooted phone and a linked computer, disguising regular traffic to look like the new VoLTE protocols. Exploiting that vulnerability, Tu was able to dodge data charges, shut down a target’s data connection with a DDoS-like attack, or drive a victim’s data charges through the roof. Tu’s attacks work entirely within the cell network, setting them apart from normal internet-based exploits and letting them bypass traditional operator firewalls. The result for most exploits would be a simple loss of service, as high-priority signal traffic crowds out everything else arriving on the phone.”
http://www.theverge.com/2015/10/22/9594128/volte-vulnerability-attack-verizon-att-tmobile
Related posts:
Lew Rockwell: No Choice Between 2 Warmongering Puppets
You’re infected—if you want to see your data again, pay us $300
FBI “Communities Against Terrorism” Suspicious Activity Reporting Flyers
Greenwald Uses Pre-Russia Snowden Data to Hammer the NSA Again.
AT&T and Verizon received one gov. data request per minute last year
Google pulls leading robots from DARPA involvement
Online gambling gains momentum in US
‘There’s element of panic in US policy towards Edward Snowden’
Supreme Court Screws Small Online Businesses
UN Grabs for the Internet: Toward “Global Governance”
National I.D. By Any Other Name Still Stinks
The Complete Breakdown of How Charlie Shrem Did Nothing Wrong
Mike Hearn Wins $40K Bounty for Bitcoin Core Crowdfunding Platform
The Nightmare of Bitcoin Regulation - A Laundry List of Scenarios
Interrogation Rooms in the Post Office?