NextGen
Published in

NextGen

Sneak Into Your Phone To Modify The IMEI Information, and Your Phone Is Controlled?

Sneak Into Your Phone To Modify The IMEI Information, and Your Phone Is Controlled?
Photo by: ismagilov

Last year, 11 5G vulnerabilities were discovered by researchers, and many security professionals said they were shocked by the news.

The reason is that these vulnerabilities discovered by security researchers at Purdue University and the University of Iowa can be used by hackers to track and monitor users in real time…

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store