Who’s been watching my puppy?
Having set up petcams in my home to remotely monitor my new puppy’s behaviours with my 4G smart device when I am out, I was reminded about Shodan, the search engine that looks for IoT devices such as...
View ArticleCraigslist SMS Phishing
Craigslist, the online classified advertisements website, is not only the world’s most popular classifieds website but also one of the most popular websites on the internet. The site receives billions...
View ArticleAnti-SPAM Day 2016
I enjoyed the recent video created by Snapple named "Telegraph spam" so much I wanted to investigate the historical basis of the video and verify what spammers in the 19th century had in common with...
View ArticleGotta Spam ‘em All - Pokémon GO Spam
Over the last few weeks Niantic’s location-based augmented reality game Pokémon GO has rapidly become something of a world phenomenon. It is now one of the world’s most popular mobile applications –...
View ArticleRobbed in Broad Daylight – SMS Identity Theft
Robbed in Broad Daylight – SMS Identity Theft As I scroll back over the recent SMS history on my mobile phone I see that a number of companies ranging from banks and e-tailers, to social networks have...
View ArticleiCloud, iHack, iSpam
While on a trip to New York City you might find yourself walking down 5th Avenue peering into the windows of designer stores such Coach, Prada, Louis Vuitton, and Gucci to view mannequins wearing the...
View ArticleiCloud Attacks Expand
iCloud account hacks on celebrities - such as Pippa Middleton - have been in the news again in the last few weeks. While these attacks often generate attention when they arise, and make people aware of...
View ArticlePresident-elect Spam
Like him or loathe him Donald Trump is one of the main news stories at the moment . He also seems to be generating interest from spammers as well. We at AdaptiveMobile released a blog last year that...
View ArticleDesignated Attacker - Evolving SS7 Attacks
In the last episode “The Oath” of the Netflix series “Designated Survivor”, there is a need for an FBI agent to track down the location of a mobile phone. Their solution is to access the SS7 network,...
View ArticleTunnel Vision : Malicious data interception via SS7
The topic of telecom signalling (SS7) security has been in the news again, from reports on banking fraud being enabled by having SS7 access, to new reports issued by the US FCC and the US Department of...
View ArticleThe Flash – Around the world in 0.8 seconds
One of the interesting things when applying security to the world’s mobile phone network is that you can come across completely unexpected events that initially have you stumped, but by investigating...
View ArticleSIGIL - Getting Ahead of the Game
Today we announced the release of our new product SIGIL. Short for SIGnalling Intelligence Layer, SIGIL is a cloud-based service that analyses the outputs from telecom signalling firewalls around the...
View ArticleIreland’s Call , Careful Now
There has been a surge of reports recently in Ireland about missed calls being received by Irish mobile phone users, who then ring back these numbers generating the missed calls and are then charged...
View ArticleMeasuring the Diameter - Protecting 4G Networks
To date, almost all of the conversations regarding security of mobile networks in the media have focused on the SS7 protocol. While this system is the backbone of mobile network, and handles roaming...
View ArticleCryptocurrency Scams: The Goldrush of Cybercrime
Introduction Cryptocurrencies have become been a favourite monetary tool of cyber criminals, as their lack of centralised authority or control provides a level of anonymity not available with other...
View ArticleAdaptiveMobile Event Series - RAG Nairobi
We’ve just finished up an exciting and engaging few days in Nairobi at the recent Risk and Assurance Group (RAG) meeting. The focus of this particular meeting was to take a deeper look at emerging...
View ArticleIs GDPR a Threat to a Country’s National Security?
AdaptiveMobile Security’s CEO, Brian Collins, takes a deeper look at how the new EU regulation could hinder national security initiatives With the much heralded arrival/imposition of the General Data...
View ArticleKeeping a Low Profile – Detecting the Presence of IMSI Catchers around the World
One of the good things about working in the area of core network security, is the opportunity to find new and unexpected types of attacks. These are attacks you didn’t even know could happen, much less...
View ArticleSimjacker – Next Generation Spying Over Mobile
Today we are announcing the existence of the vulnerability and associated exploits that we call Simjacker. We believe this vulnerability has been exploited for at least the last 2 years by a highly...
View ArticleSimjacker - Frequently Asked Questions and Demos
Last week – on the 3rd of October - we presented on our research into Simjacker at VB2019. Also that day, we issued a technical paper on simajcker, which is freely available on www.simjacker.com. This...
View Article