Trojans exploit WAP subscriptions to steal money
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
4 articles
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same
Recently Ericsson and Qualcomm have begun promoting their state-of-art technology, LTE-U. Is it any better that LTE-A, which is increasingly available all over the world, including US, Europe, Russia, China