Blog Posts Tagged with "GSM"


Regin: A Malicious Platform Capable Of Spying on GSM Networks

November 25, 2014 Added by:InfosecIsland News

Kaspersky Lab's Global Research and Analysis Team has published its research on Regin - the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other "standard" spying tasks.

Comments  (3)


Researchers Demonstrate Cell Phone Tracking Vulnerability

February 20, 2012 Added by:Headlines

Researchers at the University of Minnesota’s College of Science and Engineering have revealed a technique that could allow an unauthorized third-party to track the location of a cell phone using data available from cellular networks...

Comments  (0)


Homemade Spy Drone Cracks WiFi and GSM Networks

August 01, 2011 Added by:Headlines

"WASP is equipped with the tools to crack Wi-Fi network passwords made possible by an on-board VIA EPIA Pico-ITX PC running BackTrack Linux equipped with 32GB of storage to record information. WASP can also act as a GSM network antenna meaning it will be able to eavesdrop on calls/text messages..."

Comments  (6)


Long Term Evolution of 3GPP – New Threats or Not?

March 08, 2011 Added by:Danny Lieberman

The security requirements for mobile networked devices are similar to traditional wired devices but the vulnerabilities are different, namely the potential of unmanaged BYOD tablet/smartphone to be an attack vector back into the enterprise network and to be a channel for data leakage...

Comments  (0)


Where's My Creeper Box?

February 13, 2011 Added by:Dave Porcello

Indeed, after 7 years my long-coveted creeper box has finally arrived. And nothing says Sneakers like a text message from an elegantly-placed drop box as you exit your target facility’s parking lot in an unmarked utility van...

Comments  (4)


New Hack Makes Smartphones Mobile Spy Bugs

January 20, 2011 Added by:Headlines

Ralf-Philipp Weinmann of the University of Luxembourg has identified an over-the-air attack that targets the GSM/3GPP stack enabling hackers to execute malicious code that can turn a smartphone into a mobile listening device...

Comments  (0)


New Heist - Your Conversations and Text Messages

January 12, 2011 Added by:Theresa Payton

Two cybersecurity good-guy hackers worked on cell phone vulnerabilities for roughly a year designing ways to think like bad guys to see if they could steal text messages. They recently accomplished this feat and showed how they could steal text messages from any phone within 20 seconds...

Comments  (3)


Six Cool Hacks from 2010

December 28, 2010 Added by:Headlines

Kelly Jackson Higgins has assembled an examination of six "cool" hacks from 2010. The list has a little of everything from the ethical to the not so ethical of hackers, many made headlines, and some are little known...

Comments  (0)