Thursday, May 29, 2014

Book: Mobile communications Hacking and Security - SECOND EDITION

Back in november 2011 we published our first book about mobile communications security... After more than a thousand units sold, we are proud to announce that the second edition of the boook is available.

During this two and a half years, like other researchers, we have maintained our activity in this field. The aim of this second edition of the book is to collect and synthesise most part of this information. So, what has changed during this period and has been added to this second edition?

In the 2G field, new inexpensive technologies have arised, allowing anyone to perform most practical published attacks. New attacks have also been published: denial of service, subscriber impersonation and geolocation of subscribers, among others.

We have also expanded both the theoretical study of 3G protocols and attack techinques not covered in the first edition, including the ones that we explained in RootedCON 2014.

Also, a first approximation to the study of the security of the 4G protocols, including a review of the state-of-the-art around 4G attacks, has been added.

The index of the book is available here and you can get it through the publishing house 0xWord.


  1. We have all received at least a single mobile phone every single, proper? We've most likely obtained about a few or 4 currently, which counts giving your old Nokia 3310 towards your Mum a handful of decades in the past.But now the globe has adjusted, and from Apple to Samsung to HTC into a host of up-and-coming names, deciding on your future best smartphone is often a challenging task.This is the place we enable it to be straightforward: we extensively take a look at many major smartphones and have found the ten ideal you may commit your money on. whatmobile nokia 107

    1. A formidable share, I simply given this onto a colleague who was doing just a little analysis on this. And he in reality bought me breakfast as a result of I discovered it for him.. smile. So let me reword that: Thnx for the treat! However yeah Thnkx for spending the time to debate this, I feel strongly about it and love studying extra on this topic. If possible, as you develop into expertise, would you mind updating your blog with more particulars? It’s extremely helpful for me. Large thumb up for this blog publish!
      Tangki Fiberglass

    2. I feel this is among the such a lot vital info for me. And i am satisfied studying your article. However wanna commentary on few general things, The website style is ideal, the articles is truly nice
      Tangki Panel
      Tangki Fiberglass
      Jual Septic Tank

    3. I am glad that I saw this post. It is informative blog for us and we need this type of blog thanks for share this blog, Keep posting such instructional blogs and I am looking forward for your future posts.
      Cyber Security Projects for Final Year

      JavaScript Training in Chennai

      Project Centers in Chennai

      JavaScript Training in Chennai

  2. Great explanation to given on this post and i read our full content was really amazing,then the this more important in my part of life.
    The given information very impressed for me really so nice content.
    SQL DBA Training in Chennai

  3. Thank you for your post. This was really an appreciating one. You done a good job. Keep on blogging like this unique information with us.

    PHP Training in Chennai

  4. I have read your blog its very attractive and impressive. I like it your blog.

    Java Training in Chennai Core Java Training in Chennai Core Java Training in Chennai

    Java Online Training Java Online Training JavaEE Training in Chennai Java EE Training in Chennai

  5. I like the post format as you create user engagement in the complete article. It seems round up of all published posts. Thanks for gauging the informative posts.
    cara menggugurkan kandungan

  6. The vulnerability test must be done on a regular basis or annually. The company must keep a comprehensive record of the findings and checking for further reference in the future.Hacking Tutorials

  7. You can get a complete guide for studying ethical hacking and details of courses from Indian school of ethical hacking.hack FB

  8. I am probably an innocent abroad, but it never occurred to me that my blogs were worthy of anyone's notice to bother hacking them. However, hackers seem to view even the tiniest of blogs and users as fair game. I always use Secure Random Password Generator. Learn what I have done to safeguard my Wordpress blogs in future, and make it simple to recover with no data loss.

  9. Most of the time I don’t make comments on websites, but I'd like to say that this article really forced me to do so. Really nice post!

  10. TreasureBox is operated by a group of young, passionate, and ambitious people that are working diligently towards the same goal - make your every dollar count, as we believe you deserve something better.
    Check out the best
    bike stand nz
    sofa bed nz
    gazebo nz

  11. Positive site, where did u come up with the information on this posting?I have read a few of the articles on your website now, and I really like your style. Thanks a million and please keep up the effective work.

    mobile phone repair in Novi
    iphone repair in Novi
    cell phone repair in Novi
    phone repair in Novi
    tablet repair in Novi
    ipad repair in Novi
    mobile phone repair Novi
    iphone repair Novi
    cell phone repair Novi
    phone repair Novi