In one of our recent blog articles, “Secure Phones, Wiretaps, and Security Techniques,” there was a discussion of the general principles of cell phone attacks. Now let's talk about one of the specific vectors, namely, hacking based on a vulnerability in the protocol: SS7. Is the devil as scary...