4G and 5G networks were BROKEN, HOW you can be SPYED and LOCATED

4G and 5G networks have already been hacked and contain vulnerabilities that allow spying, or locating, people using phones connected to them.

4g networks cracked 5g spied located

The 4G and 5G networks have been broken, and for the second type it is really a first, because there are extremely few, but they are affected by the same problem that exists for the older ones, and we suffer from this cause. Several academics have discovered three extremely important vulnerabilities in the 4G and 5G networks used by users all over the world, or only in certain geographic areas, where the latter are already available, often in a limited format.

These vulnerabilities of 4G and 5G networks allow those with bad intentions to intercept people's phone calls, and to geolocate them using cell phone towers, even if the location is not 100% accurate. These are the first such serious vulnerabilities that affect both 4G and 5G networks, especially for the second type, which is just about to be commercially launched for users around the world in the coming months.

Here's how 4G and 5G networks can be hacked to spy and locate us

networks 4g 5g broken glovebox

Although the 5G networks had implemented new protection measures for the existing vulnerabilities for the 4G networks, it seems that even these are not enough to keep users safe. It seems that the exploitation of these vulnerabilities does not even require extremely advanced knowledge regarding the mobile phone protocols of the towers on the basis of which the 4G and 5G networks operate, so the problem is even much bigger than many people imagine.

A group of academics have found three new security flaws in 4G and 5G, which they say can be used to intercept phone calls and track the locations of cell phone users. The findings are said to be the first time vulnerabilities have affected both 4G and the incoming 5G standard, which promises faster speeds and better security, particularly against law enforcement use of cell site simulators, known as "stingrays."

Torpedo, the torpedo, is the name of the attacks that can be executed against 4G and 5G mobile networks, and it seems that some vulnerabilities can be exploited even with equipment of only 200 dollars, which is extremely serious. Basically, any hacker who wants to exploit a vulnerable 4G or 5G network should be able to do so without much effort, but it remains to be seen to what extent these major network problems will be exploited in the wider world.