韩日草签军事情报共享协定 专家:中国或面临威胁
百度 比如,把开展“同心”行动,分解成同心建言献策、同心助推发展、同心绿化家乡、同心助学帮教、同心医疗服务、同心法律服务、同心扶贫帮困、同心温暖工程、同心共促和谐等9个重点工程项目,每个工程项目又细化分解成若干个子项目,使行动目标更加明确,活动内容更加具体,不仅为广大统战成员开展工作搭建了载体,也打造和叫响了一批统一战线“同心”品牌,为全市经济社会又好又快发展作出了积极贡献。
A subscriber identity module, or SIM card, is a circuit used to store the IMSI number and associated key used as authentication on mobile telephony devices (for example mobile phones and tablets).
101 questions
1
vote
0
answers
65
views
How secure is COMP128-2/3 algorithm against SIM cloning? [migrated]
I am currently doing research on mobile network security with a focus on SIM card cloning.
I found out that 2G originally used the COMP128-1 algorithm, which is cryptographically broken and the secret ...
1
vote
1
answer
148
views
Is the SIM Card PUK saved on the SIM Card?
Somone I know had entered the PIN 3 times wrong. And she didn't have the PUK either. I resolved the issue (here we talk about German Vodafon, prepaid CallYa) by telling her to remove the SIM Card and ...
1
vote
1
answer
1k
views
How to prevent hackers from using my phone number to make accounts?
It seems a hacker is using my phone number to make fraudulent account, and I would like to prevent that.
Usually, if a person has your phone number, they're not able to make an account because a ...
0
votes
1
answer
3k
views
Can an employer track phone activity without a company SIM and without MDM?
Been looking for a phone upgrade and my dad has an iPhone (iPhone 13) given to him by his work, which he doesn’t use anymore. He offered to let me use it on the condition that the company can’t see ...
0
votes
1
answer
839
views
Can a simcard's public IP be accessed?
I am in a discussion with someone about IoT devices.
We use private IPs for simcards, but the other organisation is using public IPs.
I think it is possible for a hacker to access these public IPs to ...
13
votes
1
answer
8k
views
Are there any security benefits to enabling the PIN on an eSIM?
For physical SIMs, I'm aware of a number of security benefits to enabling the SIM PIN, because for an attacker with access to a lost or stolen SIM, a PIN prevents transferring the SIM to a different ...
2
votes
0
answers
111
views
Why did attackers try to change billing address in a SIM swap attack?
Recently, we saw a spat of sim swap attacks against some of our users in my organization. It was a unusually high number of "number transfer" requests being sent out by a mobile carrier. ...
0
votes
0
answers
276
views
Would removing a SIM disable the phone number and block text scams
I have a PAYG basic Nokia mobile, not a smartphone, and have noticed on my EE A/c there is a transaction for a Text Service with a charge of 15p, appearing every so often, which is nothing to do with ...
1
vote
1
answer
596
views
What is the most secure internet access option for Android phones?
My goal is to make one of my android phones as secure as possible, hence the question: What is the most secure way for an Android phone to gain internet access? Options I (think I) have:
The phone ...
-1
votes
1
answer
253
views
Is a 2fa app really better than SMS 2fa with sim-pin?
A sim-pin safeguards against sim-swapping, which is the primary advantage of using an authenticator app instead of SMS, is this not so?
2
votes
0
answers
105
views
What are the pitfalls of adding a corporate eSIM to an unmanaged employee device in lieu of land-line phones?
Instead of having a landline at each employee's desk, allow them to add an eSIM to a compatible personal cell phone. (If possible, disable SMS for the added eSIM so it is acting as a replacement for ...
1
vote
0
answers
377
views
What equipment would an attacker need to infect a SIM card?
I'm aware that SIM cards can store malware according to this question but what equipment would be needed to do such an attack? For example, would you need a Computer and a SIM card reader or could it ...
2
votes
0
answers
163
views
How much of a security threat to the PC is a SIM card running applets when plugged into a USB modem?
Background
A customer complained to a mobile phone company that they were receiving messages that were leaving the screen turned on until it was noticed by the customer (usually many hours) by which ...
0
votes
0
answers
263
views
How can you spoof you caller id but not using a voip (your carrier instead)?
My research:
I found this security stackexchange post but it didn't answer my question.
I know that you can do similar things using astresik with voip provider.
I came up on o blog that explain that ...
1
vote
1
answer
255
views
Avoiding carrying my main SIM card
In many countries, for example, Russia where I live, you need to show an ID to obtain a SIM card. Often this is used by law enforcement to track people. Sometimes corrupt officers sell people's ...