This Day On The Street
Continue to site
This account is pending registration confirmation. Please click on the link within the confirmation email previously sent you to complete registration.
Need a new registration confirmation email? Click here

How (M)Secure Are You?

LONDON, April 30, 2013 /PRNewswire/ -- According to a research conducted by CS Networks, a global provider of mobile security and messaging products, modern technology is facing dramatic security concerns in the approaches of two-step verification, especially the phone call-based one. Results are pointing to a serious exploit. "Your calls may be forwarded at any time without your knowledge."

Recent technology developments have resulted in the merging of legacy SS7 telephone network and Internet in a bid to cut down the expenses incurred by mobile operators. There is an industry-wide adoption of those hybrid products. However, a lack of access control in the legacy network protocols that are now exposed to attacks via internet may come with a price.

According to the tests performed, more than 60% of randomly selected mobile operators are prone to unauthorized call forwarding. An attacker can easily get all the information needed, such as a customer's SIM Card IMSI, to authorize himself on the network and send a specially crafted packet activating the card forwarding service with a destination number of his choice.

In practice, an attacker with the knowledge of the customer's valid phone number can easily click on "Forgot Password" button and wait for the password reset call confirmation PIN. - It's simple as that, according to Stefan Certic, Chief Technologies Officer of CS Networks.

In a recent research paper - The Future of Mobile Security, Stefan is describing (M)Secure, a next-generation two-step authentication product relying on a patent pending call forwarding indication technology. "The goal is to prevent bad guys from stealing your sensitive data by disabling a call to an active call forwarding subscriber."

Company executives are inviting all interested service providers to a quick demonstration of the security exploit.

1 of 2

Check Out Our Best Services for Investors

Action Alerts PLUS

Portfolio Manager Jim Cramer and Director of Research Jack Mohr reveal their investment tactics while giving advanced notice before every trade.

Product Features:
  • $2.5+ million portfolio
  • Large-cap and dividend focus
  • Intraday trade alerts from Cramer
Quant Ratings

Access the tool that DOMINATES the Russell 2000 and the S&P 500.

Product Features:
  • Buy, hold, or sell recommendations for over 4,300 stocks
  • Unlimited research reports on your favorite stocks
  • A custom stock screener
Stocks Under $10

David Peltier uncovers low dollar stocks with serious upside potential that are flying under Wall Street's radar.

Product Features:
  • Model portfolio
  • Stocks trading below $10
  • Intraday trade alerts
14-Days Free
Only $9.95
14-Days Free
Dividend Stock Advisor

David Peltier identifies the best of breed dividend stocks that will pay a reliable AND significant income stream.

Product Features:
  • Diversified model portfolio of dividend stocks
  • Updates with exact steps to take - BUY, HOLD, SELL
Trifecta Stocks

Every recommendation goes through 3 layers of intense scrutiny—quantitative, fundamental and technical analysis—to maximize profit potential and minimize risk.

Product Features:
  • Model Portfolio
  • Intra Day Trade alerts
  • Access to Quant Ratings
Real Money

More than 30 investing pros with skin in the game give you actionable insight and investment ideas.

Product Features:
  • Access to Jim Cramer's daily blog
  • Intraday commentary and news
  • Real-time trading forums
Only $49.95
14-Days Free
14-Days Free


Chart of I:DJI
DOW 17,798.49 -14.90 -0.08%
S&P 500 2,090.11 +1.24 0.06%
NASDAQ 5,127.5250 +11.3820 0.22%

Free Reports

Top Rated Stocks Top Rated Funds Top Rated ETFs