Pierluigi Paganini October 25, 2016
Hacking GSM A5 crypto algorithm by using commodity hardware

Researchers demonstrated how to crack GSM A5/1 Stream Cipher using a general-purpose graphics processing unit computer with 3 NVIDIA GeForce GTX690 cards. A group of security researchers from the Agency for Science, Technology and Research (A*STAR), demonstrated that the crypto scheme used in the GSM mobile phone data can be easily hacked within seconds. Actually, […]

Pierluigi Paganini November 25, 2014
Regin backdoor used to compromise the GSM Networks

Security experts at Kaspersky Lab issued a detailed paper on the analysis of the backdoor Regin focusing on the attacker’s activity against the GSM networks. The day after the disclosure of the Regin Backdoor by Symantec, which provided the details the new sophisticated cyber espionage tool,the principal security firms published the results of their investigation. As […]

Pierluigi Paganini August 28, 2013
Hacking phone firmware allows paging response attack on GSM

Researchers at last USENIX Security Symposium demonstrated that hacking phone firmware it is possible to violate the security of mobile under the same area Hacking phone firmware it is possible to interfere with other handsets  in the same area, the attack technique has been presented recently at USENIX Security Symposium by telecommunications researcher Kévin Redon. Redon […]

Pierluigi Paganini January 13, 2012
Critical infrastructures – Main threats for 2G and 3G mobile networks

Which is the critical infrastructure of a country that is most exposed to cyber threat?  The question is difficult to answer, without doubts. Communication infrastructure is a vital component of every country and we add that unlike other infrastructure it could be targeted in an attack also with the only destructive purpose with the intent […]

Pierluigi Paganini December 29, 2011
GSM mobile … the insecure network

The latest discovered vulnerability in GSM ( Global System for Mobile) technology is worrying many telecom operators of several countries due to their impact on an audience of billions users. Some experts in the Security Research Labs in Berlin have shown how to get the remote control of mobile phones to send SMS and make calls. […]