Abuse Melding

Je hebt een klacht over de onderstaande posting:

04-02-2011, 23:35 door Bitwiper

In http://www.sans.org/reading_room/whitepapers/incident/ staat momenteel nog bovenaan: Wireless Mobile Security By: Erik Couture (posted on December 3, 2010) Mobile Security: Current threats and emerging protective measures Download PDF: http://www.sans.org/reading_room/whitepapers/incident/wireless-mobile-security_33548Uit die PDF: [...] While the most common use of SMS is messaging, the underlying protocol, Wireless Application Protocol (WAP) provides the ability to send network and phone configuration details over the mobile phone network. [...] The recipient's phone can even be hacked while in ‘sleep’ mode, and the exploit can be leveraged to retrieve the phone’s unique identification numbers, personal information or other data stored on the device. Variations of the hack are effective against Windows Mobile, Apple iPhone and Google Android. At the 2009 Blackhat conference, Miller showed how he could send a malformed SMS message and crash the recipient iPhone, generate a denial of service ...

Beschrijf je klacht (Optioneel):

captcha