GSM

Hacking GSM A5 crypto algorithm by using commodity hardware

Researchers demonstrated how to crack GSM A5/1 Stream Cipher using a general-purpose graphics processing unit computer with 3 NVIDIA GeForce…

8 years ago

Regin backdoor used to compromise the GSM Networks

Security experts at Kaspersky Lab issued a detailed paper on the analysis of the backdoor Regin focusing on the attacker's…

9 years ago

Hacking phone firmware allows paging response attack on GSM

Researchers at last USENIX Security Symposium demonstrated that hacking phone firmware it is possible to violate the security of mobile…

11 years ago

Critical infrastructures – Main threats for 2G and 3G mobile networks

Which is the critical infrastructure of a country that is most exposed to cyber threat?  The question is difficult to…

12 years ago

GSM mobile … the insecure network

The latest discovered vulnerability in GSM ( Global System for Mobile) technology is worrying many telecom operators of several countries due…

12 years ago

This website uses cookies.