Let me first say I DO NOT work for the company in question. . .
One of the many sources the network security industry looks at:
http://www.securityfocus.com/news/10271
I think this source is pretty familiar to most of you:
http://news.yahoo.com/news?tmpl=story&u ... lar_hacker
T-Mobile. . . .pwn3d
Moderator: Moderators
T-Mobile. . . .pwn3d
"Power is NOTHING without control"
1994 & 2005 Legacy GT Wagons
1994 & 2005 Legacy GT Wagons
-
- Knowledgeable
- Posts: 9809
- Joined: Mon Jun 16, 2003 11:20 pm
- Location: Beverly, MA
-
- Vikash
- Posts: 12517
- Joined: Sun Nov 03, 2002 2:13 am
- Location: USA, OH, Cleveland (sometimes visiting DC though)
- Contact:
POTS isn't generally as intertwined with email and voice mail and stuff like that though.
But I don't get it -- why would the Secret Service be putting any of their important information in the hands of T-Mobile?
But I don't get it -- why would the Secret Service be putting any of their important information in the hands of T-Mobile?
"Just reading vrg3's convoluted, information-packed posts made me feel better all over again." -- subyluvr2212
It was part of what another agent had been working on . . . and the information was originally thought safe until it was found that it was his account that was being used to instigate the breach.
There are reasons the SS and FBI use mobile communications and are loosely-connected with the major companies. I think you can guess as to a few of those reasons. . . .
There are reasons the SS and FBI use mobile communications and are loosely-connected with the major companies. I think you can guess as to a few of those reasons. . . .
"Power is NOTHING without control"
1994 & 2005 Legacy GT Wagons
1994 & 2005 Legacy GT Wagons
-
- Third Gear
- Posts: 993
- Joined: Fri Sep 03, 2004 12:41 am
- Location: Kent Ohio
-
- Third Gear
- Posts: 819
- Joined: Wed Oct 27, 2004 6:54 am
- Location: Arlington, VA