Menu Search

In the News

The Critical Hole at the Heart of Our Cell Phone Networks

The Critical Hole at the Heart of Our Cell Phone Networks

In February 2014, the US ambassador to Ukraine suffered an embarrassing leak. A secret conversation between him and US Assistant Secretary of State Victoria Nuland got posted to YouTube, in which Nuland spoke disparagingly about the European Union.



Alarming Security Defects in SS7, the Global Cellular Network—and How to Fix Them

Alarming Security Defects in SS7, the Global Cellular Network—and How to Fix Them

The global network that transfers calls between mobile phone carriers has security defects that permit hackers and governments to monitor users’ locations and eavesdrop on conversations. As more reports of these activities surface, carriers are scrambling to protect customers from a few specific types of attacks.


E2E Encryption Could Make WhatsApp a Spam Magnet

E2E Encryption Could Make WhatsApp a Spam Magnet

Facebook's WhatsApp last week announced it would roll out end-to-end encryption for its users to better protect their privacy, but the move could make the service more attractive to spammers, too.

While encryption can safeguard information from data thieves, it also can block data protectors from detecting malicious activity on their networks.

"WhatsApp's encryption policy is a win for privacy advocates, but it will not stop the growth of spam on the platform and could make the problem worse," said Simeon Coney, chief strategy officer for AdaptiveMobile.


Are telcos becoming cyber security companies?

Are telcos becoming cyber security companies?

An increasing number of telecoms and communications providers are taking an active role in providing cyber security services.


80 per cent of connected devices vulnerable to data breaches

80 per cent of connected devices vulnerable to data breaches

AdaptiveMobile estimates up to 80% of ‘connected’ devices do not have adequate security measures in place, with four in five devices on the market vulnerable to malicious or inadvertent attacks and data breaches


Security for 80% of connected devices not in place, says AdaptiveMobile

Security for 80% of connected devices not in place, says AdaptiveMobile

Mobile network security provider AdaptiveMobile argues that up to 80% of connected devices do not possess sufficient security requirements, with a similar proportion of devices liable to hacks and data breaches.

An excerpt from Gartner’s research report ‘Predict 2016: Security Solution’ says: “[The] security market will continue to evolve alongside new requirements from the Internet of Things, cloud computing and sophisticated targeted attacks.


Serious security concerns, says survey

Serious security concerns, says survey

A survey of over 6,000 United Kingdom residents by BullGuard has found that 72% of United Kingdom consumers would not know how to protect Internet of Things (IoT) devices. Additionally, connected smart coffee makers, batteries, light bulbs and even toothbrushes are also available. 57 per cent of consumers are also anxious about privacy breaches.


Google touts ‘orchestration’ as the next big thing for IoT

Google touts ‘orchestration’ as the next big thing for IoT

Making IoT devices work together better should be the focus of IoT development, according to Google.

AdaptiveMobile’s CTO, Ciaran Bradley, told IoB that a new security architecture is required to deal with the increasing connectivity of devices belonging to the Internet of Things.


IoT at MWC: We need secure network infrastructure – not shiny rings – to keep us safe

IoT at MWC: We need secure network infrastructure – not shiny rings – to keep us safe

Wearables, sensors, batteries, cool apps, great wristbands – sure, those are necessary for IoT success, but the real trick is to provision reliable, secure and private communications that Black Riders and hordes of nasty Orcs can’t intercept.


AdaptiveMobile Launches NPP 6 – The World’s First Converged Carrier Security Platform

AdaptiveMobile Launches NPP 6 – The World’s First Converged Carrier Security Platform

Delivering cloud architecture to protect all key services from IP to signalling, through to advanced messaging including RCS


Latest news from AdaptiveMobile