<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: How to protect from SIM Toolkit attack</title>
	<atom:link href="http://blog.m-sec.net/2011/how-to-protect-from-sim-toolkit-attack/feed/" rel="self" type="application/rss+xml" />
	<link>http://blog.m-sec.net/2011/how-to-protect-from-sim-toolkit-attack/</link>
	<description>When security is not enough</description>
	<lastBuildDate>Tue, 13 Nov 2012 19:16:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
	<item>
		<title>By: Markov</title>
		<link>http://blog.m-sec.net/2011/how-to-protect-from-sim-toolkit-attack/#comment-716</link>
		<dc:creator>Markov</dc:creator>
		<pubDate>Sun, 11 Nov 2012 14:52:04 +0000</pubDate>
		<guid isPermaLink="false">http://blog.m-sec.net/?p=101#comment-716</guid>
		<description>I seriously doubt that risk of a SIM Toolkit attack is real. the subscribers&#039;s SIM always sends PoR via the _originating_ SMSC. So, to direct PoRs to the carriers&#039;s premium numbers you have to have a direct SMPP connection to the carrier&#039;s own SMSC (not bulk SMS providers) which seems very unlikely for &quot;cybercrooks&quot;)
Working on a DIY OTA campaign for a local MVNO, I learned the hard way how difficult it is to get PoRs and I keep wondering how you&#039;ve managed to perform this demonstration at the conference.
Have you heard of any cases of STK attacks?</description>
		<content:encoded><![CDATA[<p>I seriously doubt that risk of a SIM Toolkit attack is real. the subscribers&#8217;s SIM always sends PoR via the _originating_ SMSC. So, to direct PoRs to the carriers&#8217;s premium numbers you have to have a direct SMPP connection to the carrier&#8217;s own SMSC (not bulk SMS providers) which seems very unlikely for &#8220;cybercrooks&#8221;)<br />
Working on a DIY OTA campaign for a local MVNO, I learned the hard way how difficult it is to get PoRs and I keep wondering how you&#8217;ve managed to perform this demonstration at the conference.<br />
Have you heard of any cases of STK attacks?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Mine sied</title>
		<link>http://blog.m-sec.net/2011/how-to-protect-from-sim-toolkit-attack/#comment-544</link>
		<dc:creator>Mine sied</dc:creator>
		<pubDate>Wed, 25 Jan 2012 13:55:48 +0000</pubDate>
		<guid isPermaLink="false">http://blog.m-sec.net/?p=101#comment-544</guid>
		<description>&lt;strong&gt;Wow nice post...&lt;/strong&gt;

[..] nice post omg [.]...</description>
		<content:encoded><![CDATA[<p><strong>Wow nice post&#8230;</strong></p>
<p>[..] nice post omg [.]&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: What We&#039;re Reading Holiday Edition — Banking.com &#124; Near Field Communication (NFC) / Smart mCommerce</title>
		<link>http://blog.m-sec.net/2011/how-to-protect-from-sim-toolkit-attack/#comment-299</link>
		<dc:creator>What We&#039;re Reading Holiday Edition — Banking.com &#124; Near Field Communication (NFC) / Smart mCommerce</dc:creator>
		<pubDate>Thu, 22 Dec 2011 17:35:08 +0000</pubDate>
		<guid isPermaLink="false">http://blog.m-sec.net/?p=101#comment-299</guid>
		<description>[...] How to protect from SIM Toolkit attack &#124; Mobile SecurityBy m-sec.netWhat else you should keep in mind is that the method used has to be convenient to everybody: people still want to use mobile banking, they still want to be able to check for the available credit from the Toolkit menu, they don&#039;t want to jailbreak, &#8230;Mobile Security [...]</description>
		<content:encoded><![CDATA[<p>[...] How to protect from SIM Toolkit attack | Mobile SecurityBy m-sec.netWhat else you should keep in mind is that the method used has to be convenient to everybody: people still want to use mobile banking, they still want to be able to check for the available credit from the Toolkit menu, they don&#039;t want to jailbreak, &#8230;Mobile Security [...]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
