Simjacker:- Locate Any Mobile With Simjacker
Privacy has become one of the issues of most significant concern in the world of telecommunications. Mobile is a tool that always goes with us and, although it is beneficial, it can also be an open door for those who wish to violate our privacy.
Access to the location of a device is one of the most compromised. It is true that Android and iOS increasingly have better systems to protect our place, but what happens when this method can skip the systems directly attacking the SIM?
Simjacker Can Get The Location Of Any Mobile By Skipping Security
In recent hours, the security company AdaptativeMobile Security has published the existence of a mobile vulnerability that it has decided to call Simjacker.
Roughly, Simjacker exploits the vulnerability of SIM cards to take control of some of our device data. The attack comes through an SMS that skips the operating system to access a piece of software known as S @ T Browser. Through this type of attacks on the SIM, it seems possible to spy on the location of any phone number.
One of the most significant risks to this attack is that, as users, we have no way of noticing this type of messages because, due to the format they use to attack us, those SMS never reaches the inbox of our mobile.
Beyond spying on the location: what is capable of achieving this type of attack?
The most striking case of Simjacker is to be able to spy on the location of our mobile by skipping the security criteria of our mobile operating system. But this would not end here because, with the appropriate UICC instructions, these types of attacks have the potential to take greater control of the smartphone. These would be some of the possibilities they wanted to highlight:
- Disinformation: send SMS and MMS with controlled content.
- Fraud: call premium numbers from our mobile.
- Espionage: beyond the location, making calls from the mobile itself to listen to the microphones.
- Malware deployment by opening specific web pages.
- Denial of service by canceling the SIM card.
- Device information (language, type of radio, battery level …).
Who Are These Attacks Affecting?
According to the security agency, this security breach could have been used for the past two years. Without revealing specific information, they are quite confident that it would have been created by a private company that collaborates with governments.
In a specific country monitoring, they have been able to observe an average of 100-150 daily attacks. Based on these data, they have compiled a graph indicating the average number of attacks each telephone number receives; leaving some impressive figures:
- 47% of affected numbers received only one attack during the week.
- The average is two attacks per phone number.
- The average number of attacks received is five per number.
- There are a small number of numbers that receive dozens of attacks a week; There are even cases of 250 seizures a week.
What conclusions can we draw from these attacks? Far from becoming a mass surveillance cyber attack, Simjacker seems to be a surveillance tool for particular users. When the majority of mobiles receive a small number of attacks, it appears that they have been victims of the attack by a simple trial and error process; being discarded at the time of not being the objective.
Should We Worry?
AdaptativeMobile has commented that they will give more details about this vulnerability in the Virus Bulletin Conference in London, on October 3. Far from being a vulnerability to exploit, the objective of this discovery is to offer a solution.
On the part of the security company, they affirm that they have already begun to take the following measures:
- Working with operators: being an attack dependent on mobile networks, operators can identify these attacks and block them before they are useful.
- I am notifying the GSM association and the SIM Alliance.
In the end, in the face of such attacks, there is nothing we can do since we cannot take measures directly beyond asking our operators to work continually improving security.
If you want to know more about the technical details, we recommend you read the Adaptative Mobile Security article.
Microsoft Develops AI That Enables Us To Talk To People Who Have Died
Technological progress is getting faster, especially now that developers are constantly innovating to bring the latest and best technology.
Talking about technology, technology AI (Artificial Intelligence) is the most developed at this time. This technology, programmed to simulate human-like thinking and action, will really thrive in 2021.
For those of you who are confused, this technology is actually already around you. One example is Google Assistant, Siri, or Alexa.
All AI is still in a 2D model. Currently, Microsoft plans to develop this into 3D. so, later the AI can speak directly with facial shapes and expressions based on the data collected.
This AI can of course be applied to people who have died by collecting voice recordings, photos, e-mails, activities on social media, and so on.
Unfortunately, this innovation is still in the patent legalization stage and has not yet begun to be developed. Although it sounds interesting, this has started to be questioned by many people.
South Korean TV Station Introduces An Artificial Intelligence-Based Host
Even though today many of us often read news from online media sites, the presence of presenters on television is still needed. This is because the host must have his own expertise to read the news so that it can attract the attention of the audience.
However, in this era of sophisticated technology, of course, there is a possibility that the work of this presenter can be replaced by modern technology. One of them is Artificial Intelligence.
This was also directly proven by a television station from South Korea called MBN News, where recently his party had exhibited an AI-based presenter who came under the name AI Kim and became the first host in South Korea to be developed using AI.
It is known that AI Kim or who has the full name AI Kim Ju-Ha was made based on the original presenter who worked at MBN News, namely Kim Ju-Ha. It was stated that the AI took about 10 hours to identify Kim Ju-Ha’s voice, speech, and body movements.
“I was created using deep learning technology by studying Kim Ju-Ha’s videos starting from the way he spoke, the sound he produced, the facial expressions, the movements of the lips, and how his body moved. I can deliver the exact same news as Kim Ju-Ha did, “said AI Kim Ju-Ha in his introduction.
It appears that AI Kim Ju-Ha can indeed speak very fluently like a real human. Even if we weren’t told that it was an AI, we probably wouldn’t even notice!
This elastic sensor technology can make robots and VR feel like a human
The development of VR (Virtual Reality) technology is currently quite great, where there are many things that have been presented using this technology. But currently, there is still a barrier between the VR world and the real world, the barrier is that we can’t touch objects in the VR world.
This is what makes researchers from Cornell University interested in developing sensors that can detect objects in the real world and can later be displayed in VR. This technology comes in the form of an elastic glove which is equipped with several sensors on the fingers.
Not only is it useful for humans, but this technology is also known to be used by robots so that they can sense objects in the real world. Maybe in the future, the robots will be able to find out what object they are holding by using these sensors.
Rob Shepherd as the head of the research said that at this time the technology had begun to be completed. Although it is quite difficult to gauge what touch feels like in the real world, these technologists allow them to make interaction relationships, especially for touch.
In addition, Shepherd also said that this technology would also be very useful for the development of VR and AR-based on motion capture. Because this sensor can tell how much pressure to apply when doing something, for example when repairing a car and changing its wheels.
How to hide files and folders from search box results in Windows 10
SHARE The files and folders found in the Windows 10 search box belong to the computer’s hard drive. All this...
How to erase personal data and information stored by Cortana in Windows 10
SHARE Deleting your personal data and information stored by Cortana in Windows 10 will no longer be a concern on...
Facebook has logged out iPhone users. Informs that “session has expired”
SHARE Facebook on iOS failed. iPhone users see “Session Expired”. The app then asks you to log in again. Facebook...
Microsoft Develops AI That Enables Us To Talk To People Who Have Died
SHARE Technological progress is getting faster, especially now that developers are constantly innovating to bring the latest and best technology....
How to make videos with special effects of transitions, text and mirror with iMovie
SHARE iMovie is a video editing program available for all Apple brand devices with an IOS system. It is easy...
How to fix NVRAM WARNING: Err = 0x01 and 0x10 error on Android devices
SHARE A very common error among users who opt for Android devices is the NVRAM WARNING Err = 0x01 and...
Google Threatens to Stop Its Search Engine Service in Australia, Why
SHARE Google has just announced that it is threatening the Australian government to stop its search engine services or search...
Again, Several WhatsApp Phone Numbers Found in Google Search
SHARE Amidst the busy conversation of people regarding WhatsApp’s new policy which makes users obliged to share their data with...
WhatsApp is increasingly anxious to be left by the user, now advertises in newspapers
SHARE India, which is one of the largest WhatsApp user countries in the world, is busy deleting WhatsApp and switching...
This is how the inside of the Samsung Galaxy S21 Ultra smartphone looks like
SHARE Samsung recently released its latest flagship smartphone, the Galaxy S21 Series, where the highest variant of the series is...
Phones1 year ago
Apple iPhone 11 (2019) – Release, Info, Leaks, Rumors
Phones1 year ago
Huawei’s New Operating System is HarmonyOS [ Officially ]
Tech1 year ago
Levi’s Bluetooth Jacket Lets You Control Your Smartphone
News2 years ago
Belle Delphine bath water – Instagram Model Sells Used Bathwater For 30$ To Their Loyal Followers