The spies in our cell networks

Posted by Mike Fong on Mar 12, 2020 2:03:33 PM
Security Magazine IMSI Catchers _Blog Image

CEO walks out of nondescript office building accompanied by COLLEAGUE. CEO pulls smartphone out of her purse to study a restaurant’s website. Her smartphone’s status bar blinks briefly to indicate a change in cellular connection status.

CEO:
Let’s see… ahh, I know what I’m having for lunch!

Nearby, inside a large, white van, SPY is operating a fake cell tower. On SPY’s laptop screen, CEO’s movements and communications begin to appear.

SPY (speaking into headphone):
Okay, we got her.

While the above scene may feel ripped out of a script for the latest spy thriller, the truth is that fake cell towers present a real and pernicious mobile security risk, one that can give threat actors an extremely valuable foothold into an organization’s most valuable information.

I’ve taken a closer look at fake cell towers in an article for Security Magazine. Learn how these spying devices work, how criminals are using them and the available tools for mitigating their risks.

READ THE ARTICLE

Topics: Mobile Security, Smartphone Hacking, Smartphone Vulnerabilities, IMSI Catchers

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Subscribe Here!

Recent Posts