As a centre of excellence in mobile security, the AdaptiveMobile Security Threat Intelligence Unit utilises the global deployments of AdaptiveMobile's Network Protection Platform (NPP), present in over 80 operators, and provides state-of-the-art protection through the correlation and analysis of over 40 billion dark data events every day.
7th Jan 2021
This presentation analyses how surveillance companies attack mobile networks (2G, 3G, 4G) attempting to track the location of mobile phone users, by showing real-life examples.
10th Dec 2020
From a M2M or IoT perspective, do you need devices to be secure? Let’s start by saying that calls from one device to another device can be intercepted, messages and security credentials can be intercepted. Even when the devices use secured or encrypted communications, it represents a significant risk to not be using a secured mobile network for connectivity.
2nd Nov 2020
By imagining the 5G security risks that the vertical industry could face in 2028, we can avoid some security loopholes and be prepared to handle them safely.
19th Oct 2020
It seems like yesterday that we were talking about 4G technology but today is all about 5G and the new challenges and threats that the deployment of this technology will bring. Based on our deep expertise of the threat landscape, here is a projection of the top 5G network security issues that we may face in 2028.
5th Oct 2020
With 5G roaming on the horizon, now is a good time to reflect on the categories of risk that network operators may face in the future for 5G interconnection traffic.
19th Aug 2020
Despite the fact that signalling firewalls have been effective at significantly enhancing network security, attackers have not been deterred. Our signalling protection platform provides enhanced security to our customers by the addition of expert security services delivered by our Threat Intelligence Unit.
7th Aug 2020
Recently in Ireland, a number of people have been targeted by fraudsters sending phishing SMSs , with the result that they have lost money. We profile how this has happened and what can be done
29th Jul 2020
There are a number of well-established security tools for defending and protecting networks. Many of the concepts were originally developed for the enterprise network environment and are finding use in mobile carriers. Just to clarify, when I say mobile carriers’ environment, I do not mean the enterprise systems and internal connectivity and services. I mean the subscriber service network of Radio, Core Packet, Intelligent Network and Service Platforms.