National Cyber Warfare Foundation (NCWF)

DefCon 2010 hack of cellular networks shows evil twin methodology


0 user ratings
2026-02-06 12:12:22
milo
Blue Team (CND)
Reports from DefCon 2010 last weekend showed how it is possible to persuade a mobile phone to log into a rogue base station created using around $1,500 worth of hardware. And, says an IT security vendor, this highlights how the 'evil twin' hacking methodology used on WiFi networks can be redeployed for use in mobile hackery.

DefCon 2010 hack of cellular networks shows evil twin methodology
https://www.infosecurity-magazine.com/news/defcon-2010-hack-of-cellular-networks-shows-evil/
Reports from DefCon 2010 last weekend showed how it is possible to persuade a mobile phone to log into a rogue base station created using around $1,500 worth of hardware. And, says an IT security vendor, this highlights how the 'evil twin' hacking methodology used on WiFi networks can be redeployed for use in mobile hackery.
Fri, 06 Aug 2010 11:25:00 GMT
https://www.infosecurity-magazine.com/news/defcon-2010-hack-of-cellular-networks-shows-evil/

Source: InfosecMagazine
Source Link: https://www.infosecurity-magazine.com/news/defcon-2010-hack-of-cellular-networks-shows-evil/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Blue Team (CND)



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.