Adventures in Mobile Telephone Security

In this webcast, the presenter will explain about the risks are described and will demonstrate just how far a motivated amateur can legally go with some basic equipment, a little imagination and some directed effort. This includes running the users own base station, fuzzing the handset's baseband processor, capturing traffic and exploiting protocol weaknesses to breach location privacy, traffic confidentiality and network availability.
Provided by: Topic: Hardware Date Added: May 2015 Format: Webcast

Find By Topic