AdaptiveMobile Security’s CEO, Brian Collins, takes a deeper look at how the new EU regulation could hinder national security initiatives
AdaptiveMobile Security recently spoke at the latest RAG event in Nairobi. Take a read through our thoughts on the event and what challenges operators are facing in Africa.
The rise in the popularity of cryptocurrencies has led to an increase in cryptocurrency-based scams. In this blog post, we analyse two separate cryptocurrency-based phishing campaigns targeting users of Luno.com and Coinbase.com
Many conversations about Mobile phone security has concerned the older SS7 network, but its successor Diameter being used to control the 4G network hasn’t received as much interest. We look at what the real threats are over this system.
Here in Ireland there has been an upsurge of recent reports on people receiving missed calls from a series of unknown numbers abroad, and then being billed large amounts of money when dialling back the number. We profile why and how this is happening, and what can be done about it.
SIGIL, a new way for Operators to get the intelligence they need to best defend against SS7 attacks
What do you do if you come across a mobile phone going from Philippines to Brazil then to China, then to Armenia, in less than 60 seconds?
Recent criminal activity using SS7 methods and a series of high-profile reports on SS7 security have focused a lot of attention on the dangers of malicious access to the SS7 network. We explain a previously unrecorded attempted type of attack - data interception via SS7 access - to show that defenses can fix the problem
Attacks over the SS7 network have gotten so well known now that they have begun featuring in Hollywood. However while more people know about SS7 attacks, the actual attackers are improving and deepening their knowledge.