Oh good grief,Security,Network,Software ,Hacking,Mobile,Security
802.11n is certainly not dead and whilst manufacturers are still recommending 802.11n deployments, enterprise IT managers should give some thought to and make plans for the eventual implementation of 802.11ac. This white paper discusses how 802.11ac is being designed to meet the demands of clients in the future, help you understand the technology, what is likely to happen in the transition from 802.11n to ac and how you can get ready to meet these new demands.
Enterprise organisations are constantly being asked to do more work with fewer people, as the size and complexity of infrastructure and applications continue to grow unabated. This guide is intended for companies, organisations, and IT professionals who are looking for a network and application monitoring tool that provides a holistic view of application performance, including performance monitoring, from the end user perspective.
Search by title or subject area
Hackers can track a smartphone just by knowing its number
A SECURITY researcher has done what they do and revealed how it is possible to take control of a mobile phone and access private, but probably banal and facile, conversations and text messages.
Karsten Nohl has shown off his abilities and the mayhem he could cause a few times, including at one showing last year. Demonstrating it again this year proves that it is a viable threat.
Nohl appeared on the CBS 60 Minutes programme to ram this home, and used less than the 60 minutes on offer to show how quickly he could access a handset.
Nolh told CBS News that any phone could be hacked simply by having the number, and that he could do a range of things to phones including “track [the owner’s] whereabouts, know where they go for work, which other people they meet when, who they call and what they say over the phone, and read their texts”.
CBS challenged Nohl to gain access to a phone given to California congressman Ted Lieu. Nohl got the number and less that an hour later was listening to a call between CBS and the congressman.
How? Well, not magic. Nohl is currently engaged in fixes for this kind of thing at a number of communications providers, according to a report in The Guardian . The hack uses the Signalling System No 7 network interchange service, which acts as a broker between phone networks.
“The mobile network is independent from the little GPS chip in your phone. It knows where you are,” said Nohl.
“So any choices that a congressman could’ve made – choosing a phone, choosing a PIN, installing or not installing certain apps – have no influence over what we are showing because this is targeting the mobile network. That, of course, is not controlled by any one customer.”
We’re all doomed. µ
To hear more about security challenges, the threats they pose and how to combat them, sign up for The INQUIRER sister site Computing’s Enterprise Security and Risk Management conference. taking place on 24 November.