36C3: SIM Card Technology From A to Z

SIM cards are all around us, and with the continuing growth of the Internet of Things, spawning technologies like NB-IoT, this might as well be very literal soon. But what do we really know about them, their internal structure, and their communication protocols? And by extension, their security? To shine …read more

Continue reading 36C3: SIM Card Technology From A to Z

A 4G Rover And The Benefits Of A Shakedown Mission

Many moons ago, in the shadowy darkness of the 1990s, a young Lewin visited his elder cousin. An adept AMOS programmer, he had managed to get his Amiga 500 to control an RC car, with little more than a large pile of relays and guile. Everything worked well, but there …read more

Continue reading A 4G Rover And The Benefits Of A Shakedown Mission

Determinants of Success in Tomorrow’s Ultra-Connected World

(The following article is reprinted from The Fast Mode)   A growing number of players, from Mobile Network Operators to Mobile Virtualized Network Operators, are vying for their share of today’s competitive telecoms market. With brand loyalt… Continue reading Determinants of Success in Tomorrow’s Ultra-Connected World

5G Networks: Shaping Quality of Experience (QoE) in the 5G Era

After reigning for 8+ years as the standard for mobile broadband, 4G networks are about to be dethroned by 5G. 5G networks promise dramatically faster speeds, lower latency and massive machine to machine communications – but is this enough to ens… Continue reading 5G Networks: Shaping Quality of Experience (QoE) in the 5G Era

Does Lawful Interception of 4G / the proposed 5G provide a back door for hackers as well?

A common saying among people in the field of cryptography and security is that when providing a back door to law enforcement, you also provide a back door for hackers.

I was trying to examine the implementation of Lawful Int… Continue reading Does Lawful Interception of 4G / the proposed 5G provide a back door for hackers as well?

DNSSEC, TurboTax Hit, & DNS – Hack Naked News #209

    Google ditches passwords in latest Android devices, ICANN calls for wholesale DNSSEC deployment, Flaws in 4G and 5G allow snooping on calls, pinpointing device location, TurboTax Hit with credential stuffing attack, and much more! Security News Pla… Continue reading DNSSEC, TurboTax Hit, & DNS – Hack Naked News #209

New privacy-breaking attacks against phones on 4G and 5G cellular networks

Three new attacks can be used to track the location and intercept calls of phone users connected to 4G and 5G cellular networks, researchers from Purdue University and The University of Iowa have revealed. About the attacks Syed Rafiul Hussain, Mitziu … Continue reading New privacy-breaking attacks against phones on 4G and 5G cellular networks

5G Cellphone’s Location Privacy Broken Before It’s Even Implemented

Although hard to believe in the age of cheap IMSI-catchers, “subscriber location privacy” is supposed to be protected by mobile phone protocols. The Authentication and Key Agreement (AKA) protocol provides location privacy for 3G, 4G, and 5G connections, and it’s been broken at a basic enough level that three successive generations of a technology have had some of their secrets laid bare in one fell swoop.

When 3G was developed, long ago now, spoofing cell towers was expensive and difficult enough that the phone’s International Mobile Subscriber Identity (IMSI) was transmitted unencrypted. For 5G, a more secure version based on …read more

Continue reading 5G Cellphone’s Location Privacy Broken Before It’s Even Implemented