Hijacking Mobile Data Connections
Source: Black Hat
The use of data connections on mobile phones keeps growing at a steady rate. New services are continuously deployed and mobile phones keep getting smarter. Its work shows how an attacker may be able to take complete control of data connections originated by a mobile phone, by remotely re-configuring the handset connection parameters. This can be achieved by leveraging the standard provisioning mechanism, SMS source spoofing and social engineering techniques.