Tech

Leaky location data bug fixed by O2 UK

Share
Share


  • A security researcher found a way to pull all sorts of sensitive data from a call
  • Among the data was geo-location information as well
  • The bug was present since early 2023 but was now fixed

O2 UK has fixed a vulnerability in its VoLTE and Wi-Fi Calling implementations that allowed malicious actors to discover people’s locations and other identifiers.

Back in 2017, the company introduced the IP Multimedia Subsystem (IMS) service, called “4G Calling”. The service provides better audio quality, and more reliable phone calls. However, Daniel Williams, a security researcher, recently analyzed the feature and discovered that during the call, he was able to pull all sorts of information about his conversation partner, straight from the network.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
Low-cost method can remove CO₂ from air using cold temperatures and common materials
Tech

Low-cost method can remove CO₂ from air using cold temperatures and common materials

Molecular simulation results for structures in the CoRE-MOF-DDEC database. Credit: Energy &...

Low-power, nonvolatile RF switch promises energy-efficient 6G and autonomous vehicle communications
Tech

Low-power, nonvolatile RF switch promises energy-efficient 6G and autonomous vehicle communications

Device schematics and images with material characterization. Credit: Advanced Science (2025). DOI:...

NPU core improves inference performance by over 60%
Tech

NPU core improves inference performance by over 60%

Oaken’s quantization algorithm consisting of three components: (a) threshold-based online-offline hybrid quantization,...

MIT’s new Wi-Fi radar trick lets robots see through walls and find tools buried deep in drawers
Tech

MIT’s new Wi-Fi radar trick lets robots see through walls and find tools buried deep in drawers

mmNorm reconstructs complex hidden shapes using Wi-Fi frequencies without touching the object...