The Latest in IT Security

Two Billion Phones Vulnerable to Over-the-Air Delivered Risks

09
Aug
2014

Security researchers have dissected the over-the-air (OTA) communication mechanisms, learned how it works and its flaws, and abused it with custom code that allowed execution of code leading to complete compromise of the mobile phone.Mathew Solnik and Marc Blanchou of Accuvant Labs prepared the presentation for the Black Hat security conference taking place in Las Vegas this week, where they also demonstrated OTA code execution.Reaching the phone wirelessly offers an attacker the possibility t…

Comments are closed.

Categories

THURSDAY, APRIL 25, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments