Featured Articles

Nvidia Shield 2 shows up in AnTuTu

Nvidia Shield 2 shows up in AnTuTu

Nvidia’s original Shield console launched last summer to mixed reviews. It went on sale in the US and so far Nvidia…

More...
AMD CSO John Byrne talks ARM

AMD CSO John Byrne talks ARM

We had a chance to talk about AMD’s upcoming products with John Byrne, Chief Sales Officer, AMD. We covered a number…

More...
AMD Chief Sales Officer thinks GPU leadership is critical

AMD Chief Sales Officer thinks GPU leadership is critical

We had a chance to talk to John Byrne who spent the last two years as Senior Vice President and Chief…

More...
OpenPlus One $299 5.5-inch Full HD phone

OpenPlus One $299 5.5-inch Full HD phone

OnePlus is one of the few small companies that might disrupt the Android phone market, dominated by giant outfits like Samsung.…

More...
KFA2 GTX 780 Ti Hall Of Fame reviewed

KFA2 GTX 780 Ti Hall Of Fame reviewed

KFA2 gained a lot of overclocking experience with the GTX 780 Hall of Fame (HOF), which we had a chance to…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Friday, 11 March 2011 10:18

Boffins can switch off a mobile phone using SMS

Written by Nick Farell
y_exclamation

Attack of doom
Two insecurity experts have been showing off a technique which allows them to control a mobile phone anywhere in the world using SMS. Nico Golde and Collin Mulliner showed a video demonstration of phones from a wide range of manufacturers, including LG, Sony Ericsson, Nokia and others rebooting, freezing and generally acting flaky after receiving the crafted SMS messages.

The pair used the technique on feature phones, because feature phones still are far more prevalent in most of the world than smartphones are, so the target area is much larger. In a demonstration at CanSecWest  the pair said that the attack did not need user interaction  and the attacker can be anywhere in the world.

What they did was set up their own GSM network using a laptop running OpenBSC and targeted various phones that they purchased on eBay. These included a Nokia S40, a variety of LG handsets and Sony Ericsson devices. The messages they sent included a binary payload.

In most cases they could get the phone to reboot or freeze on a start-up screen. In one case they totally bricked a Sony Ericsson phone.

More here.


Nick Farell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

Comments  

 
+3 #1 Bl0bb3r 2011-03-11 22:09
All nice and well until filtering is handled at the operator level before the client gets the message.
 

To be able to post comments please log-in with Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments