Researchers from SRLabs found that telecos are implementing the RCS standard in vulnerable ways, which bring back techniques to attack phone networks. https://t.co/fsP8vmxcrF
— Geeknik (•̪̀●́) Labs (@geeknik) November 29, 2019
SMS Replacement is Exposing Users to Text, Call Interception Thanks to Sloppy Telecos // It would be good to have some Canadian reporters determine the security statuses of RCS deployments on the Rogers, Fido, and Freedom networks https://t.co/BWtEbwrfNb
— Christopher Parsons (@caparsons) November 29, 2019
"All of these mistakes from the 90s are being reinvented, reintroduced." https://t.co/yCl8Y6d35x
— VICE (@VICE) November 29, 2019
For as long as it took to introduce RCS, one would’ve hoped they took that time to improve security. Looks not. https://t.co/57qQctFsS4
— Kyle Baker (@kylebaker) November 29, 2019
"I'm surprised that large companies introduce a technology that exposes literally hundreds of millions of people, without asking them, without telling them." https://t.co/yCl8Y6d35x
— VICE (@VICE) November 29, 2019
« SRLabs didn't find an issue in the RCS standard itself, but rather how it is being implemented by different telecos. » https://t.co/YUCnkPDBg6
— Yan (@yangrunenberger) November 29, 2019
Here are more details about the attacks on RCS, which telecos are rolling out as the replacement to SMS https://t.co/d1snlhCSFG pic.twitter.com/SInuDDgSq5
— Joseph Cox (@josephfcox) November 29, 2019
A standard used by phone carriers around the world can leave users open to all sorts of attacks, new research reveals. https://t.co/JN5UGbVBcg
— VICE (@VICE) November 29, 2019
Bad RCS implementations are creating big vulnerabilities, security researchers claim https://t.co/pniCYZtewD
— Evan Kirstel (@evankirstel) November 29, 2019
#Security #Cybersecurity #Hackers #Databreach #Cybercrime #DataPrivacy #Ransomware #Cyberattacks #CSO #Infosec #Malware #CISO #CyberDefense
Bad RCS implementations are creating big #vulnerabilities, #security researchers claim#CyberSecurity https://t.co/Ugtjmmp2Fc@ingliguori @Paula_Piccard @MikeQuindazzi @HaroldSinnott @KenLittle @mvollmer1 @enricomolinari pic.twitter.com/Yx8TKl0a10
— Renato Munari (@RenatoMunari) November 29, 2019
Bad RCS implementations are creating big vulnerabilities, security researchers claim https://t.co/7WdpmJirrj pic.twitter.com/T0oEMOZPQ2
— The Verge (@verge) November 29, 2019
Shocking. (Not shocking) https://t.co/CHvHzQIu8W
— Dieter Bohn (@backlon) November 29, 2019
New: multiple telecos are deploying RCS—the replacement to SMS—in ways that expose users to text and call interception, spoof phone calls, and leaking location data https://t.co/MGvQBAbIq7
— Joseph Cox (@josephfcox) November 29, 2019
Surprise (…not really): RCS is also a giant security problem.https://t.co/TX7n8vb7ie
— Maik Zumstrull (@maikzumstrull) November 29, 2019
Hey @EE, isn't it pretty irresponsible that you still don't provide a way to turn this off on the network side? (Turning it off in the app doesn't protect from these attacks.)
Researchers from @SecReLabs found that telecos are implementing the RCS standard in vulnerable ways, which bring back techniques to attack phone networks#100DaysOfCodehttps://t.co/tZeJ8UDO6S
— ChancesR (@JohnnyC72115643) November 29, 2019
"All of these mistakes from the 90s are being reinvented, reintroduced." https://t.co/yCl8Y6d35x
— VICE (@VICE) November 29, 2019