Jump to content

Invite Scene - #1 to Buy, Sell, Trade or Find Free Torrent Invites

#1 TorrentInvites Community. Buy, Sell, Trade or Find Free Torrent Invites for Every Private Torrent Trackers. HDB, BTN, AOM, DB9, PTP, RED, MTV, EXIGO, FL, IPT, TVBZ, AB, BIB, TIK, EMP, FSC, GGN, KG, MTTP, TL, TTG, 32P, AHD, CHD, CG, OPS, TT, WIHD, BHD, U2 etc.

LOOKING FOR HIGH QUALITY SEEDBOX? EVOSEEDBOX.COM PROVIDES YOU BLAZING FAST & HIGH END SEEDBOXES | STARTING AT $5.00/MONTH!

New type of scam lets criminals steal your phone and assume your identity


bsaambl

Recommended Posts

A security breach in mobile phone networks may allow malicious hackers to assume their identity, according to researchers at 360 Technology Security.

Phone numbers can be the security key for many important things in your life. They are linked to social networking accounts, email, tasks, banking applications, and more. When criminals can use your phone number, things get pretty scary.

According to the information, cybercriminals can hack phones when devices need to switch from modern LTE wireless networks to 2G technology. Our phones do this all the time when the signal is weak, even when you do not realize it is happening.

When your device connects to a network, the service provider receives authentication codes that ensure that it is authentic, not a cloned number. However, when switching between LTE and 2G, these authentication codes are not required.

Perhaps the worst that Huang and his team have discovered is that if a hacker uses this technique – whose details have not been revealed – and successfully take their phone number, you will never know.

Under the nickname “Ghost Telephonist,” the attack can cause multiple headaches for victims, as criminals can use the phone number on their own devices to gain access to many of their Accounts online.

Fortunately, the failure has already been reported to international regulators of mobile networks, and researchers who reported the failure said many carriers are already correcting the problem.

Separately, few days ago, two men were arrested in the UK on suspicion of involvement in a plan to hack Microsoft and steal data from the company’s customers. The suspects, a 22-year-old from Sleaford, Lincolnshire; And another 25, from Bracknell, Berkshire, were charged under the Computer Misuse Act, a 1990 law that criminalizes cyber-attacks and piracy.

Both were allegedly involved in repeated efforts to gain unauthorized access to Microsoft systems during the first three months of this year. Detectives from the UK’s Southeastern Regional Organized Crime Unit (SEROCU) have seized devices alleged to have been used in hacking attempts.

As part of the investigation, SEROCU coordinated actions with the UK’s National Cybercrime Unit, Europol and the FBI, as well as with Microsoft itself.
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Check out what our members are saying

  • Our picks

×
×
  • Create New...