Quantcast
Channel: AdaptiveMobile Security Blog
Browsing all 182 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Who’s been watching my puppy?

Having set up petcams in my home to remotely monitor my new puppy’s behaviours with my 4G smart device when I am out, I was reminded about Shodan, the search engine that looks for IoT devices such as...

View Article


Image may be NSFW.
Clik here to view.

Craigslist SMS Phishing

Craigslist, the online classified advertisements website, is not only the world’s most popular classifieds website but also one of the most popular websites on the internet. The site receives billions...

View Article


Image may be NSFW.
Clik here to view.

Anti-SPAM Day 2016

I enjoyed the recent video created by Snapple named "Telegraph spam" so much I wanted to investigate the historical basis of the video and verify what spammers in the 19th century had in common with...

View Article

Image may be NSFW.
Clik here to view.

Gotta Spam ‘em All - Pokémon GO Spam

Over the last few weeks Niantic’s location-based augmented reality game Pokémon GO has rapidly become something of a world phenomenon. It is now one of the world’s most popular mobile applications –...

View Article

Image may be NSFW.
Clik here to view.

Robbed in Broad Daylight – SMS Identity Theft

Robbed in Broad Daylight – SMS Identity Theft As I scroll back over the recent SMS history on my mobile phone I see that a number of companies ranging from banks and e-tailers, to social networks have...

View Article


Image may be NSFW.
Clik here to view.

iCloud, iHack, iSpam

While on a trip to New York City you might find yourself walking down 5th Avenue peering into the windows of designer stores such Coach, Prada, Louis Vuitton, and Gucci to view mannequins wearing the...

View Article

Image may be NSFW.
Clik here to view.

iCloud Attacks Expand

iCloud account hacks on celebrities - such as Pippa Middleton - have been in the news again in the last few weeks. While these attacks often generate attention when they arise, and make people aware of...

View Article

Image may be NSFW.
Clik here to view.

President-elect Spam

Like him or loathe him Donald Trump is one of the main news stories at the moment . He also seems to be generating interest from spammers as well. We at AdaptiveMobile released a blog last year that...

View Article


Image may be NSFW.
Clik here to view.

Designated Attacker - Evolving SS7 Attacks

In the last episode “The Oath” of the Netflix series “Designated Survivor”, there is a need for an FBI agent to track down the location of a mobile phone. Their solution is to access the SS7 network,...

View Article


Image may be NSFW.
Clik here to view.

Tunnel Vision : Malicious data interception via SS7

The topic of telecom signalling (SS7) security has been in the news again, from reports on banking fraud being enabled by having SS7 access, to new reports issued by the US FCC and the US Department of...

View Article

Image may be NSFW.
Clik here to view.

The Flash – Around the world in 0.8 seconds

One of the interesting things when applying security to the world’s mobile phone network is that you can come across completely unexpected events that initially have you stumped, but by investigating...

View Article

Image may be NSFW.
Clik here to view.

SIGIL - Getting Ahead of the Game

Today we announced the release of our new product SIGIL. Short for SIGnalling Intelligence Layer, SIGIL is a cloud-based service that analyses the outputs from telecom signalling firewalls around the...

View Article

Image may be NSFW.
Clik here to view.

Ireland’s Call , Careful Now

There has been a surge of reports recently in Ireland about missed calls being received by Irish mobile phone users, who then ring back these numbers generating the missed calls and are then charged...

View Article


Image may be NSFW.
Clik here to view.

Measuring the Diameter - Protecting 4G Networks

To date, almost all of the conversations regarding security of mobile networks in the media have focused on the SS7 protocol. While this system is the backbone of mobile network, and handles roaming...

View Article

Image may be NSFW.
Clik here to view.

Cryptocurrency Scams: The Goldrush of Cybercrime

Introduction Cryptocurrencies have become been a favourite monetary tool of cyber criminals, as their lack of centralised authority or control provides a level of anonymity not available with other...

View Article


Image may be NSFW.
Clik here to view.

AdaptiveMobile Event Series - RAG Nairobi

We’ve just finished up an exciting and engaging few days in Nairobi at the recent Risk and Assurance Group (RAG) meeting. The focus of this particular meeting was to take a deeper look at emerging...

View Article

Is GDPR a Threat to a Country’s National Security?

AdaptiveMobile Security’s CEO, Brian Collins, takes a deeper look at how the new EU regulation could hinder national security initiatives With the much heralded arrival/imposition of the General Data...

View Article


Image may be NSFW.
Clik here to view.

Keeping a Low Profile – Detecting the Presence of IMSI Catchers around the World

One of the good things about working in the area of core network security, is the opportunity to find new and unexpected types of attacks. These are attacks you didn’t even know could happen, much less...

View Article

Image may be NSFW.
Clik here to view.

Simjacker – Next Generation Spying Over Mobile

Today we are announcing the existence of the vulnerability and associated exploits that we call Simjacker.  We believe this vulnerability has been exploited for at least the last 2 years by a highly...

View Article

Image may be NSFW.
Clik here to view.

Simjacker - Frequently Asked Questions and Demos

Last week – on the 3rd of October - we presented on our research into Simjacker at VB2019. Also that day, we issued a technical paper on simajcker, which is freely available on www.simjacker.com. This...

View Article
Browsing all 182 articles
Browse latest View live