Mobile Phone Vulnerabilities

Mobile Phone Vulnerabilities

Terminal Risk counterintelligence and security threats vignette about mobile phone vulnerabilities

Print Friendly, PDF & Email

One Response to Mobile Phone Vulnerabilities

  1. Alexandros Niklan says:

    Ehmm… true this is an "out of the box" way to get to an inbox , but i think someones needs to notify that first setting up a Softswitch PBX like Asterisk, needs a lot of knowledge and skills , so who ever does that wont be targetting a cell phone of an average John Doe .. not to mention that voice mail of a provider is not number one target priority. Bluetooth for example or HSDPA/WiFi/4G are always far easier and far more preferable as ways of exploiting comms of a cell phone for a malicious person.