Subscribe to Malware Help RSS Feed RSS Feed - Subscribe to Malware Help. Org on Twitter Follow on Twitter - Malware Help YouTube Channel YouTube Channel - Subscribe to Malware Help by Email Subscribe by Email

Hacked: Researchers figure out how to crack GSM phone security

by Shanmuga| Tweet This | Google +1 | Facebook | Stumble It | Reddit | Digg |

"Two enterprising researchers claim to have figured out a way to eavesdrop on calls made using GSM mobile phones, cracking open its much-vaunted encryption.

According to David Hulton and Steve Muller, who presented the technique at the Black Hat security conference in Washington this week, GSM calls can now be recorded over long distances and cracked open in half an hour using only $1,000 worth of field-programmable gate array-aided computer equipment and a frequency scanner." – Content courtesy of Researchers figure out how to crack GSM phone security

{ 3 comments… read them below or add one }

Mark March 31, 2008 at 11:34 PM

The company I work for has purchased me an AT&T Network Wireless Card to work on our servers from the field on.

Their R&D must’ve found this is still less likely to be successfully cracked than secure wifi.

Just an interesting thought…


ArtemisKitty April 23, 2008 at 7:43 AM

Well yes, because first off it’ll take about 1000 dollars in technology, plus the knowledge on how to use it to begin with, whereas with wifi you can google and get step-by-step instructions and free software to hack it’s security. Also these guys are talking about GSM voice, which is a lot weaker and doesn’t support stuff like SSH, which your company can use with a wireless card to increase security. Don’t worry, it’s still a ways off before we the general public need to be bothered, and by then there’ll be new security. Remember the whole big deal about bluejacking?


Rafael October 31, 2008 at 5:55 PM

I’m using PhoneCrypt ( to secure my conversations and dates, it’s developed by


It’s very good, works perfectly.

I recommend!


Leave a Comment

Previous post:

Next post: