SIM Hijacking

SIM hijacking — or SIM swapping — is an attack where a fraudster contacts your cell phone provider and convinces them to switch your account to a phone that they control. Since your smartphone often serves as a security measure or backup verification system, this allows the fraudster to take over other accounts of yours. Sometimes this involves people inside… Continue reading SIM Hijacking

Superphones, Hyperloops, and Other Tech Predictions That Haven’t Happened (Yet)

Bloomberg looks back at what tech industry titans predicted would be happening “by 2020.”
– Here’s what Huawei Technologies Co. said in 2015 predicting a “superphone” by 2020, according to ZDNet: “Inspired by the biological evolution, the mobile phone … Continue reading Superphones, Hyperloops, and Other Tech Predictions That Haven’t Happened (Yet)

‘I Asked My Students To Turn In Their Cellphones and Write About Living Without Them’

Rog Srigley, writer who teaches at Humber College and Laurentian University, offered his students extra credit if they would give him their phones for nine days and write about living without them. “What they wrote was remarkable, and remarkably consis… Continue reading ‘I Asked My Students To Turn In Their Cellphones and Write About Living Without Them’

Security Vulnerabilities in the RCS Texting Protocol

Interesting research: SRLabs founder Karsten Nohl, a researcher with a track record of exposing security flaws in telephony systems, argues that RCS is in many ways no better than SS7, the decades-old phone system carriers still used for calling and texting, which has long been known to be vulnerable to interception and spoofing attacks. While using end-to-end encrypted internet-based tools… Continue reading Security Vulnerabilities in the RCS Texting Protocol