Kevin Lee recently co-wrote a fascinating study about how easy it is for an attacker to gain control of another person’s cell phone. From there, the attacker can use the phone’s multi-factor authentication tool – usually a security code provided over a text message -- to do all kinds of damage, including making unauthorized purchases. As part of the study, his research team managed to fool five wireless carriers, including Verizon Wireless, AT&T and T-Mobile, into moving a customer’s account to a different phone’s SIM card without their permission. He’s a doctoral student in computer science at Princeton, affiliated with the Center for Information Technology Policy.
Prateek Mittal, associate professor of electrical engineering at Princeton University, is here to discuss his team's research into how hackers can use adversarial tactics...
We take our mobile phones everywhere we go, and it’s become scary easy for services and apps to collect information about our movements. But...
When you’re shopping for a new gadget online, there’s a good chance you consulted the reviews on YouTube. So many of them are well...