CAP Anomaly Spotter for Security and Much More
Internet of things phenomenon has brought countless new connecting devices to mobile networks and the trend will most likely continue in the future. The fact that IoT devices are often designed to have low computational capacity to achieve as small power consumption as possible, combined with poor design choices in many of the early IoT devices, has lead to IoT having a bad reputation on the security front.
In this post we will explore what is the current state of IoT security and how mobile network operators can help IoT devices to achieve security while maintaining desirable power consumption.Read more..
In our previous blog post we laid out some of the attacks that are very much possible in the world of mobile networking. To succeed on these the attacker must conduct some research in advance about the victim. One of the important details to know is it victims International Mobile Subscriber Identity aka. IMSI. It is globaly unique identifier from witch it is possible to discover on which operators network the subscriber is. Next we’ll go over a few means to aquire that information.Read more..
Mobile phones and communications have become ubiquitous in the 21st century and it is being powered by a global network of interconnected carrier networks. This allows users from anywhere to communicate with almost anyone from anywhere else but also presents security and privacy concerns of global scale.Read more..