There’s a new open-source project to detect cellphone-snooping technology
The EFF's Crocodile Hunter includes an API that gathers data on IMSI catchers and shares it with other researchers.
4G is vulnerable to same types of attacks as 3G, researchers say
As with the flaw-ridden protocol underlying 3G, the 4G protocol is susceptible to attacks that disclose mobile users’ information or impose a denial or service, according to new research.
Researchers uncover 4G LTE exploits that can be used to spy, spoof and cause panic
Exploits include the ability to spoof or track a victim device’s location, intercept phone calls and messages and even inject fake emergency alerts.
4G LTE protocols used by smartphones can be hacked, researchers found
The Diameter protocol, which replaces the older SS7, can disrupt services to both specific users and nodes that provide access for entire regions.