<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: New SIM Card Flaw Lets Hackers Hijack Phone With SMS</title>
	<atom:link href="http://www.epanorama.net/blog/2019/09/13/new-sim-card-flaw-lets-hackers-hijack-phone-with-sms/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/09/13/new-sim-card-flaw-lets-hackers-hijack-phone-with-sms/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 23 Apr 2026 22:07:48 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/13/new-sim-card-flaw-lets-hackers-hijack-phone-with-sms/comment-page-1/#comment-1651715</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 15 Sep 2019 16:37:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184078#comment-1651715</guid>
		<description><![CDATA[https://www.wired.com/story/simjacker-attack-north-korea-security-news/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.wired.com/story/simjacker-attack-north-korea-security-news/" rel="nofollow">https://www.wired.com/story/simjacker-attack-north-korea-security-news/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/13/new-sim-card-flaw-lets-hackers-hijack-phone-with-sms/comment-page-1/#comment-1651449</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 13 Sep 2019 15:44:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184078#comment-1651449</guid>
		<description><![CDATA[https://www.uusiteknologia.fi/2019/09/13/kannykoiden-sim-korteissa-tietoturvaongelmia-ei-suomessa/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.uusiteknologia.fi/2019/09/13/kannykoiden-sim-korteissa-tietoturvaongelmia-ei-suomessa/" rel="nofollow">https://www.uusiteknologia.fi/2019/09/13/kannykoiden-sim-korteissa-tietoturvaongelmia-ei-suomessa/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/13/new-sim-card-flaw-lets-hackers-hijack-phone-with-sms/comment-page-1/#comment-1651431</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 13 Sep 2019 12:13:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184078#comment-1651431</guid>
		<description><![CDATA[Report: https://simjacker.com/]]></description>
		<content:encoded><![CDATA[<p>Report: <a href="https://simjacker.com/" rel="nofollow">https://simjacker.com/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/13/new-sim-card-flaw-lets-hackers-hijack-phone-with-sms/comment-page-1/#comment-1651430</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 13 Sep 2019 12:12:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184078#comment-1651430</guid>
		<description><![CDATA[1B Mobile Users Vulnerable to Ongoing SimJacker Surveillance Attack
https://threatpost.com/1b-mobile-users-vulnerable-to-ongoing-simjacker-surveillance-attack/148277/
More than one billion mobile users are at risk from a SIM card flaw
being currently exploited by threat actors, researchers warn.. Also:
https://www.zdnet.com/article/new-simjacker-attack-exploited-in-the-wild-to-track-users-for-at-least-two-years/]]></description>
		<content:encoded><![CDATA[<p>1B Mobile Users Vulnerable to Ongoing SimJacker Surveillance Attack<br />
<a href="https://threatpost.com/1b-mobile-users-vulnerable-to-ongoing-simjacker-surveillance-attack/148277/" rel="nofollow">https://threatpost.com/1b-mobile-users-vulnerable-to-ongoing-simjacker-surveillance-attack/148277/</a><br />
More than one billion mobile users are at risk from a SIM card flaw<br />
being currently exploited by threat actors, researchers warn.. Also:<br />
<a href="https://www.zdnet.com/article/new-simjacker-attack-exploited-in-the-wild-to-track-users-for-at-least-two-years/" rel="nofollow">https://www.zdnet.com/article/new-simjacker-attack-exploited-in-the-wild-to-track-users-for-at-least-two-years/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/09/13/new-sim-card-flaw-lets-hackers-hijack-phone-with-sms/comment-page-1/#comment-1651406</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 13 Sep 2019 08:20:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184078#comment-1651406</guid>
		<description><![CDATA[Hackers are exploiting a platform-agnostic flaw to track mobile phone locations
Attacks work by sending commands directly to applications stored on SIM cards.
https://arstechnica.com/information-technology/2019/09/hackers-are-exploiting-a-platform-agnostic-flaw-to-track-mobile-phone-locations/]]></description>
		<content:encoded><![CDATA[<p>Hackers are exploiting a platform-agnostic flaw to track mobile phone locations<br />
Attacks work by sending commands directly to applications stored on SIM cards.<br />
<a href="https://arstechnica.com/information-technology/2019/09/hackers-are-exploiting-a-platform-agnostic-flaw-to-track-mobile-phone-locations/" rel="nofollow">https://arstechnica.com/information-technology/2019/09/hackers-are-exploiting-a-platform-agnostic-flaw-to-track-mobile-phone-locations/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
