HackDig : Dig high-quality web security articles for hacker

Researchers demonstrate how to steal Bitcoin by exploiting SS7 issues

Hackers have exploited security weaknesses in SS7 protocol to break into a GMail account, take control of a bitcoin wallet and steal funds. In June 2016, researchers with Positive Technologies demonstrated that it is possible to hack Facebook accounts by knowing phone numbers by exploiting a flaw in the SS7 protocol. The technique allows bypassing any securi
Publish At:2017-09-19 13:05 | Read:4061 | Comments:0 | Tags:Breaking News Hacking Bitcoin mobile SS7 two-factor authenti

eBay Asks Users to Downgrade Security

Last week, KrebsOnSecurity received an email from eBay. The company wanted me to switch from using a hardware key fob when logging into eBay to receiving a one-time code sent via text message. I found it remarkable that eBay, which at one time was well ahead of most e-commerce companies in providing more robust online authentication options, is now essential
Publish At:2017-03-23 08:00 | Read:3410 | Comments:0 | Tags:Other eBay 2FA eBay security eBay two-factor authentication

Abusing protocols in LTE networks to knock mobile devices off networks

A group of researchers from Nokia Bell Labs and Aalto University in Finland demonstrated how to hack protocols used in the LTE networks. We discussed several times the rule of the SS7 signaling protocol in mobile communications and how to exploit its flaws to track users. When mobile users travel between countries, their mobile devices connect to the infrast
Publish At:2016-11-08 17:55 | Read:5829 | Comments:0 | Tags:Breaking News Hacking Mobile BlackHat EUROPE DOS LTE Network

Hacking Facebook Accounts with just a phone number through the SS7 protocol

Hacking Facebook Accounts with just a phone number is possible, experts from Positive Technologies demonstrated it exploiting flaws in the SS7 protocol. Hacking Facebook accounts by knowing phone numbers it is possible, a group of researchers from Positive Technologies demonstrated it. “Researchers have proven just that by taking control of a Facebook
Publish At:2016-06-15 21:00 | Read:3105 | Comments:0 | Tags:Breaking News Hacking Mobile Social Networks Hacking Faceboo

The ULIN Story

Some of you might have noticed the articles, or the leaked manual itself, about a tool called ULIN. ULIN is a “bleeding-edge spy tool” for mobile communication networks. According to the manual, it is aimed to be a surveillance software for agencies (or others with enough money) for tracking and intercepting the Voice Calls and SMS of arbitrary p
Publish At:2016-06-03 17:40 | Read:3777 | Comments:0 | Tags:Insecurity gsm ss7 surveillance

Researchers hack WhatsApp accounts through SS7 protocol

White Hackers from Positive Technologies demonstrate how to exploit SS7 protocol to impersonate WhatsApp and Telegram users and act on their behalf. Both WhatsApp and Telegram messaging services have implemented the end-to-end encryption for chats in order to protect the privacy of their users and improve their security. Is it enough to keep prying eyes far
Publish At:2016-05-10 08:05 | Read:3437 | Comments:0 | Tags:Breaking News Hacking Mobile instant messaging Hacking mobil

How hackers eavesdropped on a US Congressman using only his phone number

A US congressman has learned first-hand just how vulnerable cellphones are to eavesdropping and geographic tracking after hackers were able to record his calls and monitor his movements using nothing more than the public ten-digit phone number associated with the handset he used.The stalking of US Representative Ted Lieu's smartphone was carried out with his
Publish At:2016-04-18 21:10 | Read:4184 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab carriers eaves

SS7 flaw allows hackers to spy on every conversation

By Exploiting a flaw in the SS7 protocol hackers can access every conversation and text message mobile users send from everywhere in the world. Hackers can spy on every mobile phone user wherever it is. Channel Nine’s 60 Minutes has revealed the existence of a security hole in modern telecommunication systems that could
Publish At:2015-08-18 14:15 | Read:3236 | Comments:0 | Tags:Breaking News Cyber Crime Digital ID Hacking Intelligence ea

SS7 Attacks and Potential Breaches in Telecommunication Leading to Chaos.The Ukraine case.

Recent revelations have made it clear that SS7 breaches can occur, thanks to the vulnerabilities of such a set of protocols for telecom. Hackers can take advantage of these threats, like they have done in the past, as German researchers warn. The example of Ukraine and Russia highlights the danger crawling towards countries wi
Publish At:2014-12-29 19:35 | Read:4031 | Comments:0 | Tags:Intelligence Security eavesdropping Information Warfare Russ

Surveillance – How to secretly track cellphone users position around the globe

Using the proper surveillance systems available on the market it is easy and quick to track cellphone and the movements of targets everywhere on the globe. We recently discussed about the decision of Wikileaks to publish copies of the criticized surveillance software FinFisher, highlighting the dangers for the militarizatio
Publish At:2014-09-18 03:40 | Read:4062 | Comments:0 | Tags:Hacking Intelligence cellphone FinFisher IMSI catchers man-i


Share high-quality web security related articles with you:)


Tag Cloud