Menu

Security : Insights

As a centre of excellence in mobile security, the AdaptiveMobile Security Threat Intelligence Unit utilises the global deployments of AdaptiveMobile's Network Protection Platform (NPP), present in over 80 operators, and provides state-of-the-art protection through the correlation and analysis of over 40 billion dark data events every day.

NEW WHITEPAPER

Securing the Path from 4G to 5G:
How to protect mobile networks and subscribers during migration

Blog

How surveillance companies track you using mobile networks

7th Jan 2021

This presentation analyses how surveillance companies attack mobile networks (2G, 3G, 4G) attempting to track the location of mobile phone users, by showing real-life examples.

Read more >

Role of Network Security in High Value M2M and IoT Apps

10th Dec 2020

From a M2M or IoT perspective, do you need devices to be secure? Let’s start by saying that calls from one device to another device can be intercepted, messages and security credentials can be intercepted. Even when the devices use secured or encrypted communications, it represents a significant risk to not be using a secured mobile network for connectivity.

Read more >

OWASP: Top 5G Vertical Industry Security Risks in 2028

2nd Nov 2020

By imagining the 5G security risks that the vertical industry could face in 2028, we can avoid some security loopholes and be prepared to handle them safely.

Read more >

Top 5G network security issues in 2028 - 5G OWASP for Networks

19th Oct 2020

It seems like yesterday that we were talking about 4G technology but today is all about 5G and the new challenges and threats that the deployment of this technology will bring. Based on our deep expertise of the threat landscape, here is a projection of the top 5G network security issues that we may face in 2028.

Read more >

Reports

Securing the Path from 4G to 5G: How to protect mobile networks and subscribers during migration

Download the whitepaper >

Simjacker Technical Paper

Download the report >

A New Dawn in Security: Who is Responsible for the Protection of a Nation’s Critical Communications Infrastructure?

Download the whitepaper >

5G - The Security of Things to Come

Download the report >

Visualisations

5G Networks - How to Secure the Future

View Webinar >

COVID-19 SMS Spam Dashboard

View Dashboard >

Securing National Critical Infrastructure Infographic

View Infographic >

Simjacker

Watch video >