[LINK] Hacker Access to Mobile-Device Location
Paul Brooks
pbrooks-link at layer10.com.au
Fri Mar 2 16:19:02 AEDT 2012
On 17/02/2012 3:44 PM, Paul Brooks wrote:
> On 17/02/2012 2:57 PM, Fernando Cassia wrote:
>> On Thu, Feb 16, 2012 at 22:37, Roger Clarke <Roger.Clarke at xamax.com.au> wrote:
>>> Cellular networks leak the locations of cell phone users, allowing a
>>> third party to easily track the location of the cell phone user
>>> without the user's knowledge, according to new research by computer
>>> scientists in the University of Minnesota's College of Science and
>>> Engineering.
>> What is needed to completely destroy the mobile providers is actually
>> for someone to come up with a USB-plugged radio for under $250 that
>> can fake a cell tower. Think Man-in-the-middle attack... that
>> intercepts all traffic and then forwards data to a real cell tower.
>> That's when the fun would begin.
> A little more than $250, but not too much more
>
> https://www.youtube.com/watch?v=wjYAAmHvt-g&feature=plcp&context=C32e208bUDOEgsToPDskKop078aXUamgIJqmS9a3fZ
>
> enjoy all four parts.
>
> P.
>
Reviving a previous thread...
End-to-end application level encryption protects against this sort of thing, and also
against sniffing by ISPs in the middle.
It is absolutely essential that you enable SSL or TLS security (always, not just 'when
available') when setting up email accounts on any device, both retrieving (POP3 or
IMAP) and sending (SMTP).
Especially when setting up email accounts in a mobile phone - or any portable device
that might be used in a public WiFi area.
Check your email accounts settings now!
(after setting up 8 email accounts on a new mobile phone)
P.
More information about the Link
mailing list