Tag: Voicemail Hacking

Highlights from DEFCON 26 – CF047

This week on Cyber Frontiers Christian and Jim get together to talk about the highlights from DEFCON 26. We dive deep into how voicemails and SMS-unlocks are being used to bypass two-factor authentication on common technology platforms — and how simple attack surfaces are exploited to turn the old tech of voicemails into eye-candy for attackers. We also review the hardware and application based mechanisms used to avoid some of these commonly exploited vectors.

Click for more / Podcast Player>