
“Research shows how much damage a bad actor can do with a rooted phone and a linked computer, disguising regular traffic to look like the new VoLTE protocols. Exploiting that vulnerability, Tu was able to dodge data charges, shut down a target’s data connection with a DDoS-like attack, or drive a victim’s data charges through the roof. Tu’s attacks work entirely within the cell network, setting them apart from normal internet-based exploits and letting them bypass traditional operator firewalls. The result for most exploits would be a simple loss of service, as high-priority signal traffic crowds out everything else arriving on the phone.”
http://www.theverge.com/2015/10/22/9594128/volte-vulnerability-attack-verizon-att-tmobile
Related posts:
China Bans Margin Calls; Limits Pension Funds To Buying Stocks Only
Gun Control Stats - Compare 10 Big "Killers" In The U.S.
Another day, another stunning security flaw in Android
TSA Harasses Ron Paul and His Wife in Florida
Life in the Emerging American Police State: What’s in Store for 2014?
It’s all over: Bitcoin miner maker HashFast to auction remaining assets
Administration Can't Let Go: Felony Streaming Provisions Of SOPA Are Back
Iran’s new president promises: We will never make nuclear weapons
Can You Name the One Nation in the World with a Higher Corporate Tax Rate than the United States?
California Supreme Court deals massive blow to medical marijuana industry
Death toll in Texas fertilizer plant explosion rises to 14
Goodbye Cable TV, Hello Google
Limbaugh and Hannity to be dropped by major radio network
Bootleggers and Baptists on the Beach
Obama Faces a Bigger Ticking Time Bomb than Obamacare Itself