NB Productions  Your guide on the Web since 2000
TigerDirect
 
Spread The Word!

Bookmark and Share

 Subscrib 

 Follow nbproductioncom on Twitter

Navigation
· Home
· Advertising
· Archive
· Articles
· AvantGo
· Downloads
· Encyclopedia
· FAQ
· Forums
· Knowledge Base
· Latest News
· Legal
· Reviews
· Search
· Statistics
· Syndicate
· Topics
· Tutorials
· Web Links
Translator
Select Interface Language:

Affiliates

NSA

Referrals 

Windows 7 Home Page

Vista Home Page

Microsoft : Fast Facts

 Microsoft Fix It

 

Livin Low

Daniel D Low Franklin

Livin Low

Music Artist


1· AC / DC
· Cliff Adams
· Tori Amos
· The Beatles
· Chuck Berry
· Bon Jovi
· Kate Bush
· Clannad
· Eric Clapton
10 · Clark Hutchinson
11 · Joe Cocker
12 · The Corrs
13 · The Cranberries
15 · Deep Purple
16 · Diamond Rio
17 · The Doors
18 · Steve Earle
19 · Fleetwood Mac
20 · Free
21 · Peter Gabriel
22 · Rory Gallagher
23 · Genesis
24 · Goo Goo Dolls
25 · David Gray
26 · Guns''n''Roses
27 ·  Alex Harvey Band
28 · Jimi Hendrix
29 · John Lee Hooker
30 · Humble Pie
31 · Michael Jackson
32 · Janis Joplin
33 · Norah Jones
34 · B. B. King
35 · Jerry Lee Lewis
36 · Amanda Marshall
37 · Matchbox 20
38 · Nine below zero
39 · Sin?ad O''Connor
40 · Pink Floyd
41 · Elvis Presley
42 · Carlos Santana
43 · Dan Seals
44 · Steely Dan
45 · Steppenwolf
46 · The Rolling Stones
47 · U2
48 · Uriah Heep
49 · Neil Young
50 · Led Zeppelin
51 · ZZ Top

Researchers Hijack Cell Phone Data, GSM Locations
Wireless Today

A pair of security researchers has discovered a number of new attack vectors that give them the ability to not only locate any GSM mobile handset anywhere in the world, but also find the name of the subscriber associated with virtually any cellular phone number, raising serious privacy and security concerns for customers of all of the major mobile providers.  

The research, which Don Bailey of iSec Partners and idndependent security researcher Nick DePetrillo will present at the SOURCE conference in Boston today, builds upon earlier work on geolocation of GSM handsets and exposes a number of fundamental weaknesses in the architecture of mobile providers' networks. However, these are not software or hardware vulnerabilities that can be patched or mitigated with workarounds. Rather, they are features and functionality built into the networks and back-end systems that Bailey and DePetrillo have found ways to abuse in order to discover information that most cell users assume is private and known only to the cell provider.
Read the full article

Posted on Thursday, April 22, 2010 @ 08:23:17 UTC by NB
 
Login
Nickname

Password

Security Code
Security Code
Type Security Code

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.
Related Links
· More about Wireless Today
· News by NB


Most read story about Wireless Today:
Mariposa virus back on Vodafone Android smartphones

Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Excellent
Very Good
Good
Regular
Bad

Options

 Printer Friendly Printer Friendly

Associated Topics

Wireless Today

 Back to the top 



 ©  nb-productions.com 2000-2013


:: fiappleblue theme by www.nukemods.com ::