Menu

Blog

How surveillance companies track you using mobile networks

7th Jan 2021

This presentation analyses how surveillance companies attack mobile networks (2G, 3G, 4G) attempting to track the location of mobile phone users, by showing real-life examples.

Read more >

Role of Network Security in High Value M2M and IoT Apps

10th Dec 2020

From a M2M or IoT perspective, do you need devices to be secure? Let’s start by saying that calls from one device to another device can be intercepted, messages and security credentials can be intercepted. Even when the devices use secured or encrypted communications, it represents a significant risk to not be using a secured mobile network for connectivity.

Read more >

OWASP: Top 5G Vertical Industry Security Risks in 2028

2nd Nov 2020

By imagining the 5G security risks that the vertical industry could face in 2028, we can avoid some security loopholes and be prepared to handle them safely.

Read more >

Top 5G network security issues in 2028 - 5G OWASP for Networks

19th Oct 2020

It seems like yesterday that we were talking about 4G technology but today is all about 5G and the new challenges and threats that the deployment of this technology will bring. Based on our deep expertise of the threat landscape, here is a projection of the top 5G network security issues that we may face in 2028.

Read more >

5G Security Projections for the Future

5th Oct 2020

With 5G roaming on the horizon, now is a good time to reflect on the categories of risk that network operators may face in the future for 5G interconnection traffic.

Read more >

The Signalling Firewall and Beyond- How to Maintain an Effective Signalling Protection Capability

19th Aug 2020

Despite the fact that signalling firewalls have been effective at significantly enhancing network security, attackers have not been deterred. Our signalling protection platform provides enhanced security to our customers by the addition of expert security services delivered by our Threat Intelligence Unit.

Read more >

Analysis of a SMS Bank Phishing Campaign in Ireland

7th Aug 2020

Recently in Ireland, a number of people have been targeted by fraudsters sending phishing SMSs , with the result that they have lost money. We profile how this has happened and what can be done

Read more >

Mobile Network Security Tool Box: how to proactively protect your network

29th Jul 2020

There are a number of well-established security tools for defending and protecting networks. Many of the concepts were originally developed for the enterprise network environment and are finding use in mobile carriers. Just to clarify, when I say mobile carriers’ environment, I do not mean the enterprise systems and internal connectivity and services. I mean the subscriber service network of Radio, Core Packet, Intelligent Network and Service Platforms.

Read more >

Mobile Network Security – The Threat Cycle: Don’t just play it by ear

9th Jul 2020

Declaring any technology as 100% secure is a very dangerous statement to make, especially when the security in question is protecting something of value. Value attracts attackers, hackers and fraudsters like nothing else.

Read more >