Worry for Samsung Galaxy users as calls could be intercepted

samsung

Whenever we talk over the phone we tend to give away lots of information about ourselves without even thinking about it. Whether it’s where we are or where we’re going to, confidential details about our professional life, or just daily complaints and events, we do so thinking that what we say is only going to be heard by the other person on the line. Sometimes we even reveal information relating to banking details, such as the account number and our date of birth, if we have to make a call to our bank.

As we like to keep a tab on our personal privacy, it’s normal for us to go to an empty room to continue a conversation or to even use a lower tone of voice so as to avoid being overheard. However, these measures might not mean an awful lot if you happen to use a Samsung Galaxy.

According to a demonstration by Daniel Komaromy and Nico Golde, two IT experts, at the recent Mobile Pwn2Own conference in Tokyo, it is possible to intercept calls made on Galaxy S6, S6 Edge, and Note 4 models.

samsung button

The investigators used the baseband chip of the devices to carry out the attack, as the chip is used to complete all radio communications. To access it, the pair used a “man-in-the-middle” attack – a classic technique that allows a cybercriminal to read and intercept a victim’s messages without them knowing a thing.

In this case, they managed to intercept voice calls by connecting these two devices with a false station, making the smartphones near to it think that it was actually a legitimate communication tower.

Once connected, these security experts were able to communicate remotely with the baseband processor without alerting the user. From that moment on they were free to intercept, listen, and even record phone calls. With a simple method, these two investigators managed to spy on these devices.

So, does this mean that any cybercriminal might be able to easily control your Galaxy device and listen to everything that I share in confidence? Komaromy and Golde have highlighted that the system that they have presented is just an example – the idea would be to later redirect the calls to a proxy to carry out the real attack and allow for the call to reach its true destination.

What’s more, these experts haven’t divulged all of the details of their experiment and have informed Samsung of their findings, so that the company can quickly find a way to clear up this vulnerability before it’s too late.

smatphones

Unfortunately, this is only one of many methods that can be used by a cyber attacker to wreak havoc. As we’ve already told you, some cybercriminals have already developed programs that activate the microphone on our smartphones so as to spy on us.

A group of investigators from the University of Stanford even developed Gyrophone, an application that used the gyroscope to capture sound vibrations created by a human voice to spy on calls.

Although we’re not going to tell you to stop using your phone for calling, we would recommend that you try to avoid giving out details relating to your bank account or access codes for your smartphone or computer while on the phone.

This piece of advice is particularly important if your job requires a high degree of privacy. Worrying about whether your smartphone is safe enough to not be targeted by cybercriminals is another thing to keep in mind, as you never know if one of them is interested in listening in on your conversations.

The post Worry for Samsung Galaxy users as calls could be intercepted appeared first on MediaCenter Panda Security.

Huawei Wimax routers vulnerable to multiple threats

Posted by Pierre Kim on Dec 03

## Advisory Information

Title: Huawei Wimax routers vulnerable to multiple threats
Advisory URL: https://pierrekim.github.io/advisories/2015-huawei-0x01.txt
Blog URL: https://pierrekim.github.io/blog/2015-12-01-Huawei-Wimax-routers-vulnerable-to-multiple-threats.html
Date published: 2015-12-01
Vendors contacted: Huawei, CERT.org
Release mode: Released
CVE: no current CVE
CERT Tracking number: VU#406192
CNNVD: no current CNNVD

## Product…

Multiple vulnerabilities in Huutopörssi's website (huutoporssi.fi)

Posted by Wub TheCaptain on Dec 03

In English
==========

Description
———–

Multiple vulnerabilities have been discovered on huutoporssi.fi that can
potentially cause information disclosure and modification of personally
identifiable account data, cross-site scripting and account privilege
escalation.

Service
——-

huutoporssi.fi is a Finnish e-commerce auction site by Huutopörssi Oy
(Y-tunnus 27094385). The website vendor is Arttu Arojoki Tmi (Y-tunnus
20514033)….

[CFP] BSides San Francisco – February 2016

Posted by BSides SF on Dec 03

(We’re a small, non-profit volunteer organization so please help us by
spreading the word. Apologies in advance if you receive this via multiple
mailing lists.)

BSides SF is soliciting papers and presentations for the 2016 annual BSides
SF conference.

CFP: https://bsidessf.com/cfp.html

** Topics **

All topic areas related to reliability, network security, privacy,
cryptography, and information security are of interest and in scope.

Let…

BF and CE vulnerabilities in ASUS RT-G32

Posted by MustLive on Dec 03

Hello list!

There are Brute Force та Code Execution vulnerabilities in ASUS Wireless
Router RT-G32. After previous Cross-Site Scripting and Cross-Site Request
Forgery vulnerabilities in RT-G32.

————————-
Affected products:
————————-

Vulnerable is the next model: ASUS RT-G32 with different versions of
firmware. I checked in ASUS RT-G32 with firmware versions 2.0.2.6 and
2.0.3.2.

———-
Details:
———-…