Wikicommons photo CC2.0 There’s a new open-source project to detect cellphone-snooping technology The EFF's Crocodile Hunter includes an API that gathers data on IMSI catchers and shares it with other researchers. Aug 5, 2020 By Sean Lyngaas
(Pixabay) 4G is vulnerable to same types of attacks as 3G, researchers say As with the flaw-ridden protocol underlying 3G, the 4G protocol is susceptible to attacks that disclose mobile users’ information or impose a denial or service, according to… Jul 2, 2018 By Sean Lyngaas
(Pixabay) Researchers uncover 4G LTE exploits that can be used to spy, spoof and cause panic Exploits include the ability to spoof or track a victim device’s location, intercept phone calls and messages and even inject fake emergency alerts. Mar 5, 2018 By Zaid Shoorbajee
Cellphone tower — Access via CC0 4G LTE protocols used by smartphones can be hacked, researchers found The Diameter protocol, which replaces the older SS7, can disrupt services to both specific users and nodes that provide access for entire regions. Nov 8, 2016