When cell phones were new (and analogue) the saying was, “Don’t say anything on a cell phone you wouldn’t say to a police officer.” Still holds true.
The technology to build a “man in the middle” attack isn’t as easy as it is with WiFi. (You can buy the Hack5 Pineapple and be ready to hack WiFi at the local coffee shop.) But the stuff is available off the shelf.
Man in the middle cell phone hack was demonstrated at Black Hat 3 or 4 years ago. They captured everything – voice and text. Cell phones are a trusting architecture. They ask “is a tower available” and if one replies, they connect. Even if that “tower” belongs to the police, or the local hacker.
March 23rd, 2014 at 9:07 pm
Let me guess. Harris Corporation.
March 24th, 2014 at 3:34 pm
When cell phones were new (and analogue) the saying was, “Don’t say anything on a cell phone you wouldn’t say to a police officer.” Still holds true.
The technology to build a “man in the middle” attack isn’t as easy as it is with WiFi. (You can buy the Hack5 Pineapple and be ready to hack WiFi at the local coffee shop.) But the stuff is available off the shelf.
Man in the middle cell phone hack was demonstrated at Black Hat 3 or 4 years ago. They captured everything – voice and text. Cell phones are a trusting architecture. They ask “is a tower available” and if one replies, they connect. Even if that “tower” belongs to the police, or the local hacker.