Menu

Blog

How surveillance companies track you using mobile networks

7th Jan 2021

This presentation analyses how surveillance companies attack mobile networks (2G, 3G, 4G) attempting to track the location of mobile phone users, by showing real-life examples.

Read more >

5G Security Blog Series (Part 3):  Different Day – Same Software, Snooping and Scams!

26th May 2020

In the final entry of our 3 part 5G Security Blog Series, Graeme Coffey, Head of Marketing gives his opinion on the overall security of 5G networks. The reason that most mobile networks are attacked is because there is inherent value for the attacker in doing so. 5G networks offer connected healthcare devices, hospital records, autonomous vehicles, flood management sensors, banking transactions and more. Will this data be secure on the 5G network?

Read more >

5G Security Blog Series (Part 2):  The Engineer’s Perspective

19th May 2020

In part 2 of our 3 part 5G Security Blog Series, Graeme Coffey, Head of Marketing shares his in-depth telecoms industry experience and opinion of the opportunities and challenges ahead for securing 5G networks. This week he gives us his insights on an engineer's perspective and the pressures they face when deploying networks.

Read more >

5G Security Blog Series:  5G security is a journey not a destination

8th May 2020

In our 5G Security Blog Series, Graeme Coffey, our Head of Marketing shares his in-depth telecoms industry experience and opinion of the opportunities and challenges ahead for securing 5G networks. Over the course of the series, he will look at the current state of 5G, then give us his insights on an engineer's perspective and finally he will look to the future, giving us an honest appraisal of the security of 5G.

Read more >

Simjacker - Frequently Asked Questions and Demos

11th Oct 2019

We have received a lot of questions since we revealed the existence and active exploitation of the Simjacker vulnerability. Here we put the most common questions, as well as showing example demos of the Location retrieval and Browser-Opening attacks, made possible by Simjacker

Read more >

Keeping a Low Profile – Detecting the Presence of IMSI Catchers around the World

20th Aug 2019

Finding IMSI Catchers can be a difficult task, and in some cases they may not be identifiable at all. However we have identified a potential new way to detect IMSI Catchers around the world.

Read more >

Measuring the Diameter - Protecting 4G Networks

6th Mar 2018

Many conversations about Mobile phone security has concerned the older SS7 network, but its successor Diameter being used to control the 4G network hasn’t received as much interest. We look at what the real threats are over this system.

Read more >

Ireland’s Call , Careful Now

20th Oct 2017

Here in Ireland there has been an upsurge of recent reports on people receiving missed calls from a series of unknown numbers abroad, and then being billed large amounts of money when dialling back the number. We profile why and how this is happening, and what can be done about it.

Read more >

SIGIL - Getting Ahead of the Game

12th Sep 2017

SIGIL, a new way for Operators to get the intelligence they need to best defend against SS7 attacks

Read more >