19th Aug 2020
As an industry, mobile services providers, suppliers and the GSMA have worked together to create a framework of recommendations covering the various network protocols involved in mobile network internetworking. From GSM MAP and CAMEL using SS7, LTE/IMS using DIAMETER, SIP/ISUP for VOICE and GTP-C for mobile data services. Corresponding interconnection security recommendations such as FS.11 (SS7 Interconnect Security Monitoring and Firewall Guideline) and FS.19 (Diameter Interconnect Security) have provided a basis for navigating the task of securing mobile networks effectively. It is clear that whilst these defences when implemented with an active firewall have been effective at significantly enhancing network security, attackers have not been deterred. In particular well organized and well-funded nation state intelligence and privately operated organizations have continued to attack networks with increasing sophistication and deception
7th Aug 2020
Recently in Ireland, a number of people have been targeted by fraudsters sending phishing SMSs , with the result that they have lost money. We profile how this has happened and what can be done
29th Jul 2020
There are a number of well-established security tools for defending and protecting networks. Many of the concepts were originally developed for the enterprise network environment and are finding use in mobile carriers. Just to clarify, when I say mobile carriers’ environment, I do not mean the enterprise systems and internal connectivity and services. I mean the subscriber service network of Radio, Core Packet, Intelligent Network and Service Platforms.
9th Jul 2020
Declaring any technology as 100% secure is a very dangerous statement to make, especially when the security in question is protecting something of value. Value attracts attackers, hackers and fraudsters like nothing else.
26th May 2020
In the final entry of our 3 part 5G Security Blog Series, Graeme Coffey, Head of Marketing gives his opinion on the overall security of 5G networks. The reason that most mobile networks are attacked is because there is inherent value for the attacker in doing so. 5G networks offer connected healthcare devices, hospital records, autonomous vehicles, flood management sensors, banking transactions and more. Will this data be secure on the 5G network?
19th May 2020
In part 2 of our 3 part 5G Security Blog Series, Graeme Coffey, Head of Marketing shares his in-depth telecoms industry experience and opinion of the opportunities and challenges ahead for securing 5G networks. This week he gives us his insights on an engineer's perspective and the pressures they face when deploying networks.
8th May 2020
In our 5G Security Blog Series, Graeme Coffey, our Head of Marketing shares his in-depth telecoms industry experience and opinion of the opportunities and challenges ahead for securing 5G networks. Over the course of the series, he will look at the current state of 5G, then give us his insights on an engineer's perspective and finally he will look to the future, giving us an honest appraisal of the security of 5G.
2nd Apr 2020
Here is a further Threat Intelligence analysis of recent Covid-19 themed SMS Spam campaigns. Scammers continue to vary their tactics and take advantage of the pandemic to capitalise on continuously evolving news cycles. The latest iterations are false government relief scam messages.
19th Mar 2020
Coronavirus based sms spam is on the rise. Here is what it looks like and what you can do to help stop it.