Skip to main content
7 events
when toggle format what by license comment
Dec 30, 2014 at 6:06 comment added tlng05 @User Maybe through manipulating your file downloads, but in general, no.
Dec 30, 2014 at 6:00 comment added User I know about phone calls and text message, but does an attacker able to put malware into my phone through the cell power impersonation?
Dec 30, 2014 at 5:40 comment added tlng05 @User Your phone willingly connects to them because it does not know the tower is fake. It does not require your permission. It only requires that you are physically close to the fake tower.
Dec 30, 2014 at 5:15 comment added User how does cell tower impersonation can FIRST happened? Does it required YOUR PERMISSION to connect to them in order for that to work, or they can just connect to you without your permission?
Dec 30, 2014 at 5:11 comment added tlng05 @User yes, virtually every phone is vulnerable to cell tower impersonation. It is a basic flaw in the design of cellular networks.
Dec 30, 2014 at 5:03 comment added User for example, let's say I use Maxis, can the fake base station method happened?
Dec 30, 2014 at 4:58 history answered tlng05 CC BY-SA 3.0