الاثنين، 14 أكتوبر 2013

Vulnerability in the SIM chip communications threaten millions of phones in the world
A security researcher revealed a loophole in the old encryption method for communication segments SIM hacker managed to control the mobile users
A security researcher revealed a loophole in the old encryption method for communication segments SIM hacker managed to control users ' phones and do some operations instead of them . The security researcher said the German " Nol Carsten " that the gap exist slices communication that uses the Data Encryption Standard DES, a criterion that was used to encrypt about three billion slice connect around the world . Noel said in his remarks highlighted by the New York Times newspaper that the gap allows hackers to know the security key for encrypted communications segments DES standard by sending messages to create fakes, where those slides automatically reply to a letter that includes the security key for the slide to the source of the counterfeit those messages . The pirates can use the security key to slice communications in order to send a message containing malicious software to control the phone , which can intercept messages that the slide will receive and carry out financial operations , taking advantage of the balance of the user of the telecommunications company . The German security researcher has experience that gap of nearly a thousand slice connections in America and Europe and managed to control it, when he said that the process of control that you do not need a computer except for normal and are in just two minutes . He estimated Noll number of segments of contacts that can be targeted through that vulnerability Currently, about 750 million slice contacts around the world , so he alerted the Federation of mobile operators (GSMA) that vulnerability serious , and promised the Federation of mobile operators , according to "The New York Times," the communion with telecommunications companies to find a way to bridge that gap before security is widely exploited by hackers . The telecom industry segments began to rely on the developer AES encryption standard , which has the properties of a more sophisticated security than standard DES, AES standard was adopted officially in 2001 , was selected in October 2000 as an alternative to the standard data encryption former .

ليست هناك تعليقات:

إرسال تعليق

Random post