Feddit.dk
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months ago

Hacking the Call Records of Millions of Americans

evanconnelly.github.io

external-link
message-square
6
link
fedilink
35
external-link

Hacking the Call Records of Millions of Americans

evanconnelly.github.io

Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 months ago
message-square
6
link
fedilink
Imagine if anyone could punch in a phone number from the largest U.S. cell carrier and instantly retrieve a list of its recent incoming calls—complete with timestamps—without compromising the device, guessing a password, or alerting the user. Now imagine that number belongs to a journalist, a police officer, a politician, or someone fleeing an abuser. This capability wasn’t a hypothetical. I recently identified a security vulnerability in the Verizon Call Filter iOS app which made it possible for an attacker to leak call history logs of Verizon Wireless customers.
  • ㅤㅤㅤㅤㅤㅤㅤㅤ@friendica.world
    link
    fedilink
    arrow-up
    5
    ·
    2 months ago

    @kid
    Proof remain, no system is safe.
    One has never finished educating or improving to defend his castle and must always stay on edge and mostly adapt.

    • lacaio da inquisição@lemmy.eco.br
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 months ago

      Maybe they didn’t invest that much on security, as the article pointed out for not having a system that would uniquely identify only the number linked to the account.

      • ㅤㅤㅤㅤㅤㅤㅤㅤ@friendica.world
        link
        fedilink
        arrow-up
        1
        ·
        2 months ago

        @obbeel
        Major point of weakness is the human aspect.
        Not any system, it’s how you handle it as not 1 can be trusted.
        No not even GNU Linux, you trust the gpg key or hash with shasum.
        Look, even the dev of my distro state, it remain your decision to trust> an intern could be corrupt, something has been done wrong or is compromised on users end as well, that key may be tampered.
        In social engineering we learned to not give any thing anything unless in a protected sense of that era called protection. And I hope you did just that .

        • ㅤㅤㅤㅤㅤㅤㅤㅤ@friendica.world
          link
          fedilink
          arrow-up
          1
          ·
          2 months ago

          @obbeel
          parrotsec.org/docs/configurati…

Cybersecurity@sh.itjust.works

cybersecurity@sh.itjust.works

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cybersecurity@sh.itjust.works

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

  • Be respectful. Everyone should feel welcome here.
  • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  • No Ads / Spamming.
  • No pornography.

Community Rules

  • Idk, keep it semi-professional?
  • Nothing illegal. We’re all ethical here.
  • Rules will be added/redefined as necessary.

If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 160 users / day
  • 350 users / week
  • 1.36K users / month
  • 4.84K users / 6 months
  • 10 local subscribers
  • 7.22K subscribers
  • 2.81K Posts
  • 5.28K Comments
  • Modlog
  • mods:
  • Kid@sh.itjust.works
  • Lanky_Pomegranate530@midwest.social
  • BE: 0.19.11
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org