Blogs

Smart Phone Attacks Shielding

Smart Phone Attacks Shielding

Current smart phones in the market combine complex and extensive computing capabilities with sometimes immature messaging technology or native security measures. Many incidents such as handsets that crashed and could even be hijacked by sending a message with a deliberately corrupted User Data Header. When the attacker uses a well-formed but malicious UDH header, it… Continue reading Smart Phone Attacks Shielding