Researchers to present new software and hardware vulnerabilities at HITB Amsterdam
Users assume the underlying hardware and software system, mobile antivirus, password managers and encryption technology will protect them from malicious attacks on their communications. Upcoming research at the HITB Security Conference in Amsterdam suggests to think twice before trusting mobile security blindly and shows that security is not a final product, but rather a bumpy process.
To secure communication via mobile devices, layered security includes secure mobile network devices. In Femtocell Hacking: From Zero to Zero Day, Korean security researcher Jeonghoon Shin takes a closer look at how to audit Femtocells – small, low-power cellular base stations typically designed for home use and now being introduced to service customers all over the world. He will show how to commandeer the device to expose SMS, voice, and call data packets sent and received through the exposed femtocell.