Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance

Welcome back, my aspiring cyberwarriors! Mobile hacking can take many forms. It can entail any of the following; (1) a hack against a singular phone such Pegasus and many other IoS and Android malware, (2) an attack against the mobile infrastructure such as SS7 (Chinese hackers have recently compromised the entire US telecom system using […]

Continue Reading

What is Data Compression and What Role Did it Play in the libwebp Cellphone Attack?

Welcome back, my aspiring cyberwarriors! Data compression makes the world go round! Well, almost. Without data compression our digital world would slow down considerably and even reading this article would be difficult and cumbersome. Nearly everything that is transmitted over the web is compressed to reduce latency and free up bandwidth. Compression is one of […]

Continue Reading

Software Defined Radio(SDR) for Hackers, Part 4: Intercepting and Decoding Confidential Pager Data

Welcome back, my aspiring RF hackers! Although few people still use pagers, they were once a common communication device used by many industries to notify employees, contractors and others of urgent information. Pagers are a wireless telecommunication device that sends and displays alphanumeric and voice messages. These pagers, once the state-of-the-art mobile communication system, are […]

Continue Reading