9th Jul 2020
Declaring any technology as 100% secure is a very dangerous statement to make, especially when the security in question is protecting something of value. Value attracts attackers, hackers and fraudsters like nothing else.
26th May 2020
In the final entry of our 3 part 5G Security Blog Series, Graeme Coffey, Head of Marketing gives his opinion on the overall security of 5G networks. The reason that most mobile networks are attacked is because there is inherent value for the attacker in doing so. 5G networks offer connected healthcare devices, hospital records, autonomous vehicles, flood management sensors, banking transactions and more. Will this data be secure on the 5G network?
19th May 2020
In part 2 of our 3 part 5G Security Blog Series, Graeme Coffey, Head of Marketing shares his in-depth telecoms industry experience and opinion of the opportunities and challenges ahead for securing 5G networks. This week he gives us his insights on an engineer's perspective and the pressures they face when deploying networks.
8th May 2020
In our 5G Security Blog Series, Graeme Coffey, our Head of Marketing shares his in-depth telecoms industry experience and opinion of the opportunities and challenges ahead for securing 5G networks. Over the course of the series, he will look at the current state of 5G, then give us his insights on an engineer's perspective and finally he will look to the future, giving us an honest appraisal of the security of 5G.
2nd Apr 2020
Here is a further Threat Intelligence analysis of recent Covid-19 themed SMS Spam campaigns. Scammers continue to vary their tactics and take advantage of the pandemic to capitalise on continuously evolving news cycles. The latest iterations are false government relief scam messages.
19th Mar 2020
Coronavirus based sms spam is on the rise. Here is what it looks like and what you can do to help stop it.
2nd Mar 2020
Threat Intelligence Analysis of the Package Delivery Spam text/SMS messages sent out to mobile subscribers in the US.
11th Oct 2019
We have received a lot of questions since we revealed the existence and active exploitation of the Simjacker vulnerability. Here we put the most common questions, as well as showing example demos of the Location retrieval and Browser-Opening attacks, made possible by Simjacker
12th Sep 2019
Today we are announcing the existence of the vulnerability and associated exploits that we call Simjacker. We believe this vulnerability has been exploited for at least the last 2 years by a highly sophisticated threat actor in multiple countries, primarily for the purposes of surveillance. Read on to discover more about this ground-breaking attack