<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: New flaws in 4G, 5G allow attackers to intercept calls and track phone locations &#124; TechCrunch</title>
	<atom:link href="http://www.epanorama.net/blog/2019/02/25/new-flaws-in-4g-5g-allow-attackers-to-intercept-calls-and-track-phone-locations-techcrunch/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/02/25/new-flaws-in-4g-5g-allow-attackers-to-intercept-calls-and-track-phone-locations-techcrunch/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 12 Apr 2026 20:41:34 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/02/25/new-flaws-in-4g-5g-allow-attackers-to-intercept-calls-and-track-phone-locations-techcrunch/comment-page-1/#comment-1631009</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 24 Mar 2019 11:17:49 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181876#comment-1631009</guid>
		<description><![CDATA[Researchers find 36 new security flaws in LTE protocol
https://www.zdnet.com/google-amp/article/researchers-find-36-new-security-flaws-in-lte-protocol/?__twitter_impression=true

South Korean researchers apply fuzzing techniques to LTE protocol and find 51 vulnerabilities, of which 36 were new.

The vulnerabilities allow attackers to disrupt mobile base stations, block incoming calls to a device, disconnect users from a mobile network, send spoofed SMS messages, and eavesdrop and manipulate user data traffic.]]></description>
		<content:encoded><![CDATA[<p>Researchers find 36 new security flaws in LTE protocol<br />
<a href="https://www.zdnet.com/google-amp/article/researchers-find-36-new-security-flaws-in-lte-protocol/?__twitter_impression=true" rel="nofollow">https://www.zdnet.com/google-amp/article/researchers-find-36-new-security-flaws-in-lte-protocol/?__twitter_impression=true</a></p>
<p>South Korean researchers apply fuzzing techniques to LTE protocol and find 51 vulnerabilities, of which 36 were new.</p>
<p>The vulnerabilities allow attackers to disrupt mobile base stations, block incoming calls to a device, disconnect users from a mobile network, send spoofed SMS messages, and eavesdrop and manipulate user data traffic.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/02/25/new-flaws-in-4g-5g-allow-attackers-to-intercept-calls-and-track-phone-locations-techcrunch/comment-page-1/#comment-1626899</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 26 Feb 2019 16:55:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181876#comment-1626899</guid>
		<description><![CDATA[ToRPEDO Privacy Attack on 4G/5G Networks Affects All U.S. Carriers
https://threatpost.com/torpedo-privacy-4g-5g/142174/

The attack threatens users with location-tracking, DoS, fake notifications and more.]]></description>
		<content:encoded><![CDATA[<p>ToRPEDO Privacy Attack on 4G/5G Networks Affects All U.S. Carriers<br />
<a href="https://threatpost.com/torpedo-privacy-4g-5g/142174/" rel="nofollow">https://threatpost.com/torpedo-privacy-4g-5g/142174/</a></p>
<p>The attack threatens users with location-tracking, DoS, fake notifications and more.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/02/25/new-flaws-in-4g-5g-allow-attackers-to-intercept-calls-and-track-phone-locations-techcrunch/comment-page-1/#comment-1626880</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 26 Feb 2019 14:36:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181876#comment-1626880</guid>
		<description><![CDATA[New Attacks Against 4G, 5G Mobile Networks Re-Enable IMSI Catchers
https://thehackernews.com/2019/02/location-tracking-imsi-catchers.html

At NDSS Symposium 2019, a group of university researchers yesterday revealed newly discovered cellular network vulnerabilities that impact both 4G and 5G LTE protocols.

According to a paper published by the researchers, &quot;Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information,&quot;]]></description>
		<content:encoded><![CDATA[<p>New Attacks Against 4G, 5G Mobile Networks Re-Enable IMSI Catchers<br />
<a href="https://thehackernews.com/2019/02/location-tracking-imsi-catchers.html" rel="nofollow">https://thehackernews.com/2019/02/location-tracking-imsi-catchers.html</a></p>
<p>At NDSS Symposium 2019, a group of university researchers yesterday revealed newly discovered cellular network vulnerabilities that impact both 4G and 5G LTE protocols.</p>
<p>According to a paper published by the researchers, &#8220;Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information,&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/02/25/new-flaws-in-4g-5g-allow-attackers-to-intercept-calls-and-track-phone-locations-techcrunch/comment-page-1/#comment-1626753</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 25 Feb 2019 21:56:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181876#comment-1626753</guid>
		<description><![CDATA[Europe is prepared to rule over 5G cybersecurity
- but does it help when core protocols are weak?

https://techcrunch.com/2019/02/25/europe-is-prepared-to-rule-over-5g-cybersecurity/]]></description>
		<content:encoded><![CDATA[<p>Europe is prepared to rule over 5G cybersecurity<br />
- but does it help when core protocols are weak?</p>
<p><a href="https://techcrunch.com/2019/02/25/europe-is-prepared-to-rule-over-5g-cybersecurity/" rel="nofollow">https://techcrunch.com/2019/02/25/europe-is-prepared-to-rule-over-5g-cybersecurity/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/02/25/new-flaws-in-4g-5g-allow-attackers-to-intercept-calls-and-track-phone-locations-techcrunch/comment-page-1/#comment-1626752</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 25 Feb 2019 21:54:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181876#comment-1626752</guid>
		<description><![CDATA[Privacy-breaking flaws in the 4G and 5G mobile protocols could allow attackers to intercept calls, send fake amber alerts or other notifications, track location and more, according to a research team from Purdue University and the University of Iowa.

In a paper presented at Mobile World Congress in Barcelona this week, the researchers explained that the issues arise from weaknesses in the cellular paging (broadcast) protocol.

https://threatpost.com/torpedo-privacy-4g-5g/142174/]]></description>
		<content:encoded><![CDATA[<p>Privacy-breaking flaws in the 4G and 5G mobile protocols could allow attackers to intercept calls, send fake amber alerts or other notifications, track location and more, according to a research team from Purdue University and the University of Iowa.</p>
<p>In a paper presented at Mobile World Congress in Barcelona this week, the researchers explained that the issues arise from weaknesses in the cellular paging (broadcast) protocol.</p>
<p><a href="https://threatpost.com/torpedo-privacy-4g-5g/142174/" rel="nofollow">https://threatpost.com/torpedo-privacy-4g-5g/142174/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/02/25/new-flaws-in-4g-5g-allow-attackers-to-intercept-calls-and-track-phone-locations-techcrunch/comment-page-1/#comment-1626660</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 25 Feb 2019 08:53:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181876#comment-1626660</guid>
		<description><![CDATA[Experts see 5G as defense to &#039;Stingray&#039; spying
https://thehill.com/policy/cybersecurity/408858-experts-see-5g-as-defense-to-stingray-spying

Security experts and privacy advocates are hopeful the rollout of the new 5G wireless network could eliminate a glaring surveillance vulnerability that allows spying on nearby phone calls.

Lawmakers have been pressing the Trump administration to crack down on technology known as &quot;Stingrays,&quot; after it was revealed they were found near federal buildings in Washington D.C. earlier this year.

The devices, International Mobile Subscriber Identity (IMSI) catchers, allow for unauthorized cellphone surveillance. They are often used by law enforcement to track suspects in cases. But the devices have vexed federal officials who until recently had no way of tracking them, sparking worries about their use by foreign powers.

5G networks would be less reliant on those towers and also would require new security standards for communications. The new network would be built using smaller cells, which are about the size of refrigerators and located every few blocks.]]></description>
		<content:encoded><![CDATA[<p>Experts see 5G as defense to &#8216;Stingray&#8217; spying<br />
<a href="https://thehill.com/policy/cybersecurity/408858-experts-see-5g-as-defense-to-stingray-spying" rel="nofollow">https://thehill.com/policy/cybersecurity/408858-experts-see-5g-as-defense-to-stingray-spying</a></p>
<p>Security experts and privacy advocates are hopeful the rollout of the new 5G wireless network could eliminate a glaring surveillance vulnerability that allows spying on nearby phone calls.</p>
<p>Lawmakers have been pressing the Trump administration to crack down on technology known as &#8220;Stingrays,&#8221; after it was revealed they were found near federal buildings in Washington D.C. earlier this year.</p>
<p>The devices, International Mobile Subscriber Identity (IMSI) catchers, allow for unauthorized cellphone surveillance. They are often used by law enforcement to track suspects in cases. But the devices have vexed federal officials who until recently had no way of tracking them, sparking worries about their use by foreign powers.</p>
<p>5G networks would be less reliant on those towers and also would require new security standards for communications. The new network would be built using smaller cells, which are about the size of refrigerators and located every few blocks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/02/25/new-flaws-in-4g-5g-allow-attackers-to-intercept-calls-and-track-phone-locations-techcrunch/comment-page-1/#comment-1626659</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 25 Feb 2019 08:52:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=181876#comment-1626659</guid>
		<description><![CDATA[Zack Whittaker / TechCrunch:
Researchers find new flaws in 4G and 5G letting hackers perform a targeted denial of service attack on a phone and track its location using ~$200 in equipment
https://techcrunch.com/2019/02/24/new-4g-5g-security-flaws/

A group of academics have found three new security flaws in 4G and 5G, which they say can be used to intercept phone calls and track the locations of cell phone users.

https://www.documentcloud.org/documents/5749002-4G-5G-paper-at-NDSS-2019.html]]></description>
		<content:encoded><![CDATA[<p>Zack Whittaker / TechCrunch:<br />
Researchers find new flaws in 4G and 5G letting hackers perform a targeted denial of service attack on a phone and track its location using ~$200 in equipment<br />
<a href="https://techcrunch.com/2019/02/24/new-4g-5g-security-flaws/" rel="nofollow">https://techcrunch.com/2019/02/24/new-4g-5g-security-flaws/</a></p>
<p>A group of academics have found three new security flaws in 4G and 5G, which they say can be used to intercept phone calls and track the locations of cell phone users.</p>
<p><a href="https://www.documentcloud.org/documents/5749002-4G-5G-paper-at-NDSS-2019.html" rel="nofollow">https://www.documentcloud.org/documents/5749002-4G-5G-paper-at-NDSS-2019.html</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
