German hacker discovers how to spy on calls from iPhone

Hacker Kohl

Apple always holds its head held high when it comes to computer security with iOS, its tremendous fight against the FBI and the North American government media that tried to include corridors to espionage in all the devices on the block, have given good faith that at Apple they are taking user privacy very seriously. But the more calm you want to appear, the more hackers want to show you how wrong you are. So that, a German hacker has made public the possibility of spying on calls and SMS received on an iPhone, including one he made with the President of the United States of America himself.

This vulnerability is based on the mobile network and all they have to do is know your phone number to exploit it. The popular show Minutes 60 he invited the hackers to demonstrate their capabilities and provide truthfulness to his words, and they of course accepted. The hackers replayed the calls they had recorded or intercepted through iPhones proving that they were absolutely right.

For this exploited a vulnerability in SS7, for those who do not know it, is the basis of the mobile phone system throughout the world. Phone companies use the SS7 system to exchange billing information for mobile lines, so billions of calls and text messages travel through their arteries every day.

Karsten Kohl is the daring German hacker, he has a Ph.D. in computer engineering from the University of Virginia. Has carried out a demonstration at a conference in the German capital of Berlin, managing to record the calls of the iPhone and even locate it despite having the GPS deactivated. He reported that the President of the United States of America called him on his phone last year and was able to intercept the call, which is really worrying.


You are interested in:
According to Apple, it is the most effective company in the world in security
Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   James said

    I say that then the vulnerability is in the SS7 protocol and that it does not matter if it is iPhone, Android, BlackBerry, etc ... right ?.

  2.   asdf said

    You say well, but somehow you have to fit the news into Actualidadiphone, which seems fine to me.

  3.   James said

    Hmmm in my opinion it's unbiased.

  4.   Lenin said

    And how do I intercept Obama's call if he is not allowed to use the iPhone? Everybody knows you use a Blackberry. How little credible the article.

    1.    Miguel Hernández said

      At no point does the hacker indicate that Obama uses an iPhone, it is the hacker who uses an iPhone ...