Researchers say your carrier network, AOS mobile isn, AOT everything

7:14 PM
Researchers say your carrier network, AOS mobile isn, AOT everything - secure

Recently, researchers discovered that the tools that update the system operating your smartphone, AOS on the air have holes that hackers can slip into!

It, AOS estimates that nearly two billion handsets are vulnerable, and in some cases, security patches haven, AOT even released.

The Device Management open mobile alliance (OMA-DM) is a protocol used by hundreds of smartphone companies to release software updates and perform network administration. And That, AOS what they say where the problem lies.

A hacker must know the handset, distinct identity AOS international mobile station equipment (IMEI), a secret token, take the remote control. It, AOS not difficult to get the IMEI number or the secret token of the company, thanks to lax networks and vulnerable versions of the operating system.

The researchers found they could easily download the code to a phone after following a WAP messages a base station and proceed as a hacker.

Another experiment showed that a false femtocell could be used to enter the BlackBerry, Android and iOS devices using some weak security protocols. Participants off their smartphones and set the femtocell to its lowest power level. Researchers have been able to collect over 70 handsets.

They found that Android was the most vulnerable, with BlackBerry. iOS has been more difficult to crack, but some devices that were run by Sprint were vulnerable

Another drawback is that the devices could be deceived by checking on their OMA-DM server. had connections http instead of https. The researchers reported that most manufacturers and carriers had fixed the OMA-DM systems, Äîmost, not all.

What are the network threats?

The pirates have almost the cyberworld at hand, can attack in many ways, using both methods, application to users users users and various machines to machines. The donation pirates, AOT just want to access data; they want to handle.

4G refers to the fourth generation network, succeeding 3G to deliver the fastest speed of the wireless business. The protocol for 4G, however, is flawed, allowing a weakening of protection for phones and networks.

The hacker would go straight to mobile networks for simpler, entry points wider. Networks for mobile devices, therefore, must be cured. If a smartphone is infected, it will be able to identify and analyze other smartphones in its proximity (since 4G is based on IP), as the carrier has not the slightest idea.

The hacker could infiltrate a desired network, access the 4G network, then have a nice easy launch pad for the crime.

If a hacker uses small wireless camera connections for its activities, it forces current smartphones use to count on a current network connection. This will make the batteries wear out faster. In addition, the jammed-up signals may lead to a denial of service.

One way to protect wireless networks is using Hotspot Shield to replace all open WiFi free of insecurities and to help protect some of 4Gs defects.

with fast speed held to come with 4G are also low levels of security and the lame network structures. Users will not appreciate this award, and mobile operators will have to step a little on security tactics to keep hackers out.

Previous
Next Post »
0 Komentar