Mobile phone security cards can be cloned in minutes allowing hackers to make calls charged to their victim's account, according to research from IBM.
In a paper to be presented at a major security symposium next week, Big Blue will reveal that hackers can discover the security number of a GSM phone in minutes.
The process, known as a 'partitioning attack', involves the analysis of power flows in the phone's SIM card, which can determine the codes inside.
But the process requires the hacker to be alone with the phone for a minute or two using IBM's 'seven questions' routine for deciphering the PIN code, and only affects so-called 'first-generation' phones.
IBM stressed that it was not a "sky is falling" announcement, but more a proof of concept to show that the technology could be developed into a potential threat.
Connexin drops out of Ofcom auction due to start next week
SwiftKey users now send two billion emoji every week
Recruitment plans are 'most ambitious ever', claims Openreach HR director Kevin Brady
Samsung's under-the-hood improvements separate the S9 from the pack when it comes to the display