Difference between revisions of "Cellular Security"
(One intermediate revision by the same user not shown) | |||
Line 7: | Line 7: | ||
:*ARM | :*ARM | ||
− | A new area of cellular security is | + | A new area of cellular security is [[VOIP]]. [[VOIP]] has many vulnerabilities as it is new and not secure as of yet. |
Latest revision as of 20:25, 13 August 2012
This article contains too little information, it should be expanded or updated. |
---|
Things you can do to help:
|
Cellular Security is the area of security involved with mobile communication networks.
A largely undocumented vulnerability in wireless phones (cellular phones) involves something called SIS Attachment Exploitation. SIS attachments are the picture and video attachments that can be attached to SMS text messages and sent phone to phone. Because most vendors do not check buffers surrounding this attachment zone, it is easy for an attacker to overflow the buffer and cause arbitrary machine code to be executed. It is for this reason that cellular phones should also never be trusted with sensitive data.
Most cellular phones vulnerable to this method of exploitation are not x86, and therefore x86-related shellcode will not work. Some architectures more likely on cellular devices include:
- ARM
A new area of cellular security is VOIP. VOIP has many vulnerabilities as it is new and not secure as of yet.