
“Research shows how much damage a bad actor can do with a rooted phone and a linked computer, disguising regular traffic to look like the new VoLTE protocols. Exploiting that vulnerability, Tu was able to dodge data charges, shut down a target’s data connection with a DDoS-like attack, or drive a victim’s data charges through the roof. Tu’s attacks work entirely within the cell network, setting them apart from normal internet-based exploits and letting them bypass traditional operator firewalls. The result for most exploits would be a simple loss of service, as high-priority signal traffic crowds out everything else arriving on the phone.”
http://www.theverge.com/2015/10/22/9594128/volte-vulnerability-attack-verizon-att-tmobile
Related posts:
TV station uses copyright law to erase embarrassing broadcast
Why Do Bureaucrats Hate Bambi?
A History of Gold Confiscation
Man trampled as hundreds of desperate Greeks scuffle for food
Cannabis Kills MRSA, Disrupts Prion Diseases
Brave Police Save Town From Man Selling Veggies
The Lifespan of Storage Media
Challenge for Keynesian Anti-Sequester Hysterics
Colorado Marijuana Dispensary Uses Bitcoin to Evade Federal Laws
Canada’s Banking System Is Crashing Before Our Eyes
Washington state prepares to take on TSA
Court Orders YouTube To Delete Every Copy Of 'Innocence Of Muslims'
Man Lists Home for Sale in Terms of Bitcoins
Silver found to be key weapon in fight against antibiotics resistance
My Night Out With Bitcoin Millionaire and Proud Stoner Charlie Shrem