3G/4G INTRANET SCANNING AND ITS APPLICATION ON THE WORMHOLE VULNERABILITY
MOBILE-TELEPHONY THREATS IN ASIA
USA-2017:
New Adventures in Spying 3G and 4G Users: Locate, Track, Monitor
Ghost Telephonist - Link Hijack Exploitations in 4G LTE CS Fallback
more information on BlackHat site
No comments:
Post a Comment