Featured Research

from universities, journals, and other organizations

Undetected evesdropping on cell phones: Common errors in cell phone programming can leave phones vulnerable

Date:
December 9, 2010
Source:
Université du Luxembourg
Summary:
A new class of attacks against mobile phones has been noted. Using a base transceiver station (available for 1000 euro) a researcher showed how common programming errors in the communication stack of mobile phones can be exploited to gain control of the devices.

A researcher at the University of Luxembourg has demonstrated a new class of attacks against mobile phones at the security conference DeepSec in Vienna. Using a base transceiver station (available for 1000 euro) he has shown how common programming errors in the communication stack of mobile phones can be exploited to gain control of the devices.

Ralf-Philipp Weinmann found devastating flaws in a large percentage of cellular communication stacks. According to him, sufficiently motivated attackers are able to attack phones in a way that is almost undetectable. Vulnerable cell phones can be taken over if they are within the range of the rogue transceiver, which may mean hundreds of phones at a time in crowded urban areas. Attackers can cause billing problems by either dialing premium numbers or sending text messages to premium services; or they can monitor the complete communications of the cell phone user.

Eavesdropping on nearby cell phones is also possible by making the vulnerable cell phone pick up incoming calls automatically -- without the user noticing.The attacking transceiver needs to be online for just a couple of seconds to perform the attack.

The University of Luxembourg, is working together with a number of vendors for both cellular communication chips and mobile phones. The objective is to fix the security flaws found and to prevent similar flaws from happening in the future.


Story Source:

The above story is based on materials provided by Université du Luxembourg. Note: Materials may be edited for content and length.


Cite This Page:

Université du Luxembourg. "Undetected evesdropping on cell phones: Common errors in cell phone programming can leave phones vulnerable." ScienceDaily. ScienceDaily, 9 December 2010. <www.sciencedaily.com/releases/2010/12/101209074201.htm>.
Université du Luxembourg. (2010, December 9). Undetected evesdropping on cell phones: Common errors in cell phone programming can leave phones vulnerable. ScienceDaily. Retrieved April 19, 2014 from www.sciencedaily.com/releases/2010/12/101209074201.htm
Université du Luxembourg. "Undetected evesdropping on cell phones: Common errors in cell phone programming can leave phones vulnerable." ScienceDaily. www.sciencedaily.com/releases/2010/12/101209074201.htm (accessed April 19, 2014).

Share This



More Computers & Math News

Saturday, April 19, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Nintendo Changed Gaming World, but Its Future Uncertain: Upstone

Nintendo Changed Gaming World, but Its Future Uncertain: Upstone

AFP (Apr. 19, 2014) — The Nintendo Game Boy celebrates its 25th anniversary Monday and game expert Stephen Upstone says the console can be credited with creating a trend towards handheld gaming devices. Duration: 01:21 Video provided by AFP
Powered by NewsLook.com
Nearly Two Weeks On, The Internet Copes With Heartbleed

Nearly Two Weeks On, The Internet Copes With Heartbleed

Newsy (Apr. 19, 2014) — The Internet is taking important steps in patching the vulnerabilities Heartbleed highlighted, but those preventive measures carry their own costs. Video provided by Newsy
Powered by NewsLook.com
Facebook To Share Nearby Friends Data With Advertisers

Facebook To Share Nearby Friends Data With Advertisers

Newsy (Apr. 19, 2014) — A Facebook spokesperson has confirmed the company will use GPS data from the new Nearby Friends feature for advertising sometime in the future. Video provided by Newsy
Powered by NewsLook.com
Man Claims He Found Loch Ness Monster With... Apple Maps?

Man Claims He Found Loch Ness Monster With... Apple Maps?

Newsy (Apr. 18, 2014) — Andy Dixon showed the Daily Mail a screenshot of what he believes to be the mythical beast swimming just below the lake's surface. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
 
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:  

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:  

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile iPhone Android Web
Follow Facebook Twitter Google+
Subscribe RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins