data network vulnerabilities
Within the attached article, the authors state there are “two new denial of service (DoS) vulnerabilities in cellular data services.” What are these two new vulnerabilities? Give a short description to explain what they are. Give an example of each one of the vulnerabilities becoming exploits under attack.