Skip to main content
spelling
Source Link
KDEx
  • 5.1k
  • 2
  • 24
  • 35

Yes. An individual hacker may do this via a femtocell tower. These are heavily demonstrated at security conferences. These devices can trick your device into installing rouge malware.

Additionally, on a larger scale, rougerogue cell phone towers have been discovered and could potentially have the same capabilities.

In both cases the devices trick your phone into thinking that it is connecting to it's trusted carrier network. From here the rougerogue devices can intercept and inject data at will.

Yes. An individual hacker may do this via a femtocell tower. These are heavily demonstrated at security conferences. These devices can trick your device into installing rouge malware.

Additionally, on a larger scale, rouge cell phone towers have been discovered and could potentially have the same capabilities.

In both cases the devices trick your phone into thinking that it is connecting to it's trusted carrier network. From here the rouge devices can intercept and inject data at will.

Yes. An individual hacker may do this via a femtocell tower. These are heavily demonstrated at security conferences. These devices can trick your device into installing rouge malware.

Additionally, on a larger scale, rogue cell phone towers have been discovered and could potentially have the same capabilities.

In both cases the devices trick your phone into thinking that it is connecting to it's trusted carrier network. From here the rogue devices can intercept and inject data at will.

Source Link
KDEx
  • 5.1k
  • 2
  • 24
  • 35

Yes. An individual hacker may do this via a femtocell tower. These are heavily demonstrated at security conferences. These devices can trick your device into installing rouge malware.

Additionally, on a larger scale, rouge cell phone towers have been discovered and could potentially have the same capabilities.

In both cases the devices trick your phone into thinking that it is connecting to it's trusted carrier network. From here the rouge devices can intercept and inject data at will.