Assuming 3g network is vulnerable, will it be also vulnerable if I tether it using a VPN router? [closed]

Will using a Wpa3 router with VPN tethering function to share a 3g modem network protect someone from the vulnerabilities in a 3g network?
I know there are 4g and 5g, I just want to know how much is possible to build securely on an insecur… Continue reading Assuming 3g network is vulnerable, will it be also vulnerable if I tether it using a VPN router? [closed]

Researchers suggest 25 countries are using a kind of mobile spyware that monitors texts, location

A private surveillance firm that exploits mobile network vulnerabilities to spy on calls, texts and location data is doing business with at least 25 governments around the globe, including some with histories of human rights abuses, concludes a report released Tuesday. The findings from the University of Toronto’s Citizen Lab scrutinize the work of the company Circles, which is a sister firm of the Israeli software surveillance broker NSO Group. Human rights activists frequently criticize NSO Group for selling its equipment to repressive regimes, a charge it rejects, even as it is the subject of a lawsuit from Facebook, which alleges that attackers used NSO Group tech to spy on thousands of WhatsApp users. The countries Citizen Lab identified as “likely” customers of Circles: Australia, Belgium, Botswana, Chile, Denmark, Ecuador, El Salvador, Estonia, Equatorial Guinea, Guatemala, Honduras, Indonesia, Israel, Kenya, Malaysia, Mexico, Morocco, Nigeria, Peru, Serbia, Thailand, the United Arab Emirates, Vietnam, Zambia and Zimbabwe. […]

The post Researchers suggest 25 countries are using a kind of mobile spyware that monitors texts, location appeared first on CyberScoop.

Continue reading Researchers suggest 25 countries are using a kind of mobile spyware that monitors texts, location

Security Vulnerabilities in the RCS Texting Protocol

Interesting research: SRLabs founder Karsten Nohl, a researcher with a track record of exposing security flaws in telephony systems, argues that RCS is in many ways no better than SS7, the decades-old phone system carriers still used for calling and texting, which has long been known to be vulnerable to interception and spoofing attacks. While using end-to-end encrypted internet-based tools… Continue reading Security Vulnerabilities in the RCS Texting Protocol