“Research shows how much damage a bad actor can do with a rooted phone and a linked computer, disguising regular traffic to look like the new VoLTE protocols. Exploiting that vulnerability, Tu was able to dodge data charges, shut down a target’s data connection with a DDoS-like attack, or drive a victim’s data charges through the roof. Tu’s attacks work entirely within the cell network, setting them apart from normal internet-based exploits and letting them bypass traditional operator firewalls. The result for most exploits would be a simple loss of service, as high-priority signal traffic crowds out everything else arriving on the phone.”
http://www.theverge.com/2015/10/22/9594128/volte-vulnerability-attack-verizon-att-tmobile
Related posts:
Bitcoiniacs Bitcoin Store Opens In Vancouver
One Man's Terrorist
Bitcoin in Vancouver on Global TV
Bitcoin Cloud-Mining Firm Listed On Australia Stock Exchange
With Every Call for Encryption Restrictions, Officials Make Its Own Case
A List Of 97 Taxes Americans Pay Every Year
Feds Give Up Trying to Seize a Motel Based on Drug Offenses by a Few Guests
Silver’s Message: The Bull Is Alive and Well
7 Fundamental Conclusions about 2014
The Mike Bloomberg Legacy: 12 Years of Little Tyrannies in 2 Minutes!
Private military operatives worked the Boston marathon with black backpacks, radiation detectors
Experts Say iPhone 5S Fingerprint Security Feature Can Be Hacked
Rail Fails While Pipelines Prevail
Europe's new financial transaction tax missing projected revenues
BitTorrent Client Devs Work on Bitcoin Integration