lte

  1. Tomcat

    4G LTE vulnerability allows pretending to be any device on the mobile network

    A joint team of researchers from the Ruhr and New York Universities has developed a new attack method that allows you to impersonate a legitimate user on a mobile network. The technique, dubbed IMP4GT (IMPersonation Attacks in 4G NeTworks), exploits a vulnerability in 4G LTE, namely the lack of...
  2. Lord777

    Vulnerabilities in 4G LTE allow tracking subscriber traffic and spoofing data

    The problems are related to the use of a weak cryptoalgorithm and the lack of proper integrity checking when transmitting packets. A joint group of researchers from the Ruhr and New York Universities published a report in which they described three types of attacks that exploit vulnerabilities...
Top