We have written about the almost infinite possibilities for surveillance and malicious activity presented by flaws in the Signaling System 7 (SS7) protocol used by virtually all mobile networks worldwide. A security research firm recently demonstrated how the same exploit can be used to drain a Bitcoin wallet. Which certainly drives home the point about how easy subverting (otherwise reliable) security systems can be.
Is your Bitcoin wallet safe? Or can SS7 flaws and bad 2FA compromise it?
[fa icon="calendar'] Oct 30, 2017 7:14:17 PM / by Stefan Topuzov
6 ways your phone can get hacked
[fa icon="calendar'] Sep 11, 2017 6:57:41 PM / by Stefan Topuzov
Is someone trying to hack your phone? The answer to this question is most likely “yes” – regardless of whether you are a person of particular interest to hackers or not. The average Joe may not be the CEO of a petroleum or pharmaceutical company, but there is still money to be made in hacking their device and extracting data. Here is how attackers do that.
Fixing SS7 vulnerabilities: What is being done and what you can do
[fa icon="calendar'] Sep 4, 2017 5:50:02 PM / by Stefan Topuzov
Last week we went over the security risk related to vulnerabilities in the SS7 protocol. Long story short: if you don't like your calls and messages being listened to and read by anyone, and prefer your bank account not to be drained, this concerns you. So, let’s take a look at the ways this type of hacking can be prevented.
Phone hacking through SS7 is frighteningly easy and effective
[fa icon="calendar'] Aug 28, 2017 5:38:58 PM / by Stefan Topuzov
Imagine a world in which a low-budget hackers can track your every move, listen to your calls, read your texts, drain your bank account, and so on. All of this without leaving their rooms, and from a continent away. Imagine no more. Due to vulnerabilities in the SS7 protocol, this is the world in which you live right now.
How vulnerabilities in SS7 protocol expose all mobile networks to attacks
[fa icon="calendar'] Jun 12, 2017 7:27:24 PM / by Stefan Topuzov
If you were an intelligence agency, your dream would be to monitor anyone, anywhere in the world, right? The inherent vulnerabilities of SS7, a protocol used by network operators around the globe, make this dream a reality. Cybercriminals have also exploited these flaws to drain bank accounts. Here is what you need to know about SS7 and how to keep your data safe.