Menu

Blog

Mobile Network Security – The Threat Cycle: Don’t just play it by ear

9th Jul 2020

Declaring any technology as 100% secure is a very dangerous statement to make, especially when the security in question is protecting something of value. Value attracts attackers, hackers and fraudsters like nothing else.

Read more >

5G Security Blog Series (Part 3):  Different Day – Same Software, Snooping and Scams!

26th May 2020

In the final entry of our 3 part 5G Security Blog Series, Graeme Coffey, Head of Marketing gives his opinion on the overall security of 5G networks. The reason that most mobile networks are attacked is because there is inherent value for the attacker in doing so. 5G networks offer connected healthcare devices, hospital records, autonomous vehicles, flood management sensors, banking transactions and more. Will this data be secure on the 5G network?

Read more >

5G Security Blog Series (Part 2):  The Engineer’s Perspective

19th May 2020

In part 2 of our 3 part 5G Security Blog Series, Graeme Coffey, Head of Marketing shares his in-depth telecoms industry experience and opinion of the opportunities and challenges ahead for securing 5G networks. This week he gives us his insights on an engineer's perspective and the pressures they face when deploying networks.

Read more >

5G Security Blog Series:  5G security is a journey not a destination

8th May 2020

In our 5G Security Blog Series, Graeme Coffey, our Head of Marketing shares his in-depth telecoms industry experience and opinion of the opportunities and challenges ahead for securing 5G networks. Over the course of the series, he will look at the current state of 5G, then give us his insights on an engineer's perspective and finally he will look to the future, giving us an honest appraisal of the security of 5G.

Read more >

Scammers seek financial help during Covid-19 pandemic

2nd Apr 2020

Here is a further Threat Intelligence analysis of recent Covid-19 themed SMS Spam campaigns. Scammers continue to vary their tactics and take advantage of the pandemic to capitalise on continuously evolving news cycles. The latest iterations are false government relief scam messages.

Read more >

Stopping the Spread of Coronavirus Spam

19th Mar 2020

Coronavirus based sms spam is on the rise. Here is what it looks like and what you can do to help stop it.

Read more >

Package Delivery SMS spam: delivering messages, you definitely don’t want to open!

2nd Mar 2020

Threat Intelligence Analysis of the Package Delivery Spam text/SMS messages sent out to mobile subscribers in the US.

Read more >

Simjacker - Frequently Asked Questions and Demos

11th Oct 2019

We have received a lot of questions since we revealed the existence and active exploitation of the Simjacker vulnerability. Here we put the most common questions, as well as showing example demos of the Location retrieval and Browser-Opening attacks, made possible by Simjacker

Read more >

Simjacker – Next Generation Spying Over Mobile

12th Sep 2019

Today we are announcing the existence of the vulnerability and associated exploits that we call Simjacker. We believe this vulnerability has been exploited for at least the last 2 years by a highly sophisticated threat actor in multiple countries, primarily for the purposes of surveillance. Read on to discover more about this ground-breaking attack

Read more >