preload preload preload preload preload preload

Service Level Agreement

Service Level Agreement between Vysk Communications and <Customer Service Support Provider> October 19, 2017   Table of Contents   Overview                                                                                            3 1.a. Parties to the agreement 1.b. Purpose and scope of the agreement   Services to be Provided                                                                       4   Service ...

Man in the Middle Attack

The Threat Man-in-the-Middle (MITM) mobile attacks can be accomplished in a wide range of technical ways, but the high level effect is the same in every scenario. An individual manages to insert himself between a call originator and recipient, and manages, as well, to fool each party into believing they are communicating directly with the other desired party, when, in fact, they are each communicating with the attacker. Having thus convinced each party that they are taking part in a legitimate and secure conversation, the attacker then has access to both parties’ IMSI numbers, physical locations, and all of the contents of their conversation, which can, in turn, be eavesdropped on or recorded for other nefarious purposes. How Does It ...

Malware/Spyware Attack

The Threat There exist many types of malware targeting mobile devices. And with the proliferation of mobile phones over the past decade, malware developers have dramatically ramped up their efforts to create and distribute malicious software to the cell phone community. Unsurprisingly perhaps, financial attacks are the single largest category of malware. According to a recent article by Ori Bach at SecurityIntelligence.com, about 30% of all extant malware is built for the purpose of stealing financial information. Other popular categories include stealing personal information, keystroke logging, deploying cryptographic ransomware, or opening the phone up to remote control of cameras, microphones, or call eavesdropping.   How’s It ...

Hacking the CCS7 Network

The Threat The CCS7 network was developed in the mid seventies to control the routing of phone calls using out-of-band signaling. The data packets transmitted on the network control not only the initiation and completion of calls, but also numerous billing functions and the activation of advanced features that are today taken for granted (call forwarding, call waiting, etc.). Because the data packets transmitted via CCS7 are unencrypted, it has become relatively easy to gain access to this network and to use it to perform numerous nefarious activities, most notable of which are locating a cell phone with an accuracy of a few meters and intercepting and eavesdropping on calls. The weaknesses of the CCS7 network came to the fore in mid 2014 ...

Baseband Attack

The Threat The baseband processor in a mobile phone is the system that communicates via radio waves with the cell tower in order to complete cellular calls. Because your mobile phone communicates via cell towers, in order to intercept the radio signal from a cell phone, the hacker must first set up a fake cell tower and convince a nearby phone (the target) to connect to it. The hacker can then download malicious code that will attack vulnerabilities in the GSM/3GPP stacks of the phone’s baseband processor, typically Qualcomm or Infineon chip sets. While this attack type is limited to those individuals or entities with the resources and technical know-how to set up their own bogus cell towers, the cost of setting one up has fallen ...