The spies in our cell networks

Posted by Mike Fong on Mar 12, 2020 2:03:33 PM
Security Magazine IMSI Catchers _Blog Image

CEO walks out of nondescript office building accompanied by COLLEAGUE. CEO pulls smartphone out of her purse to study a restaurant’s website. Her smartphone’s status bar blinks briefly to indicate a change in cellular connection status.

Let’s see… ahh, I know what I’m having for lunch!

Nearby, inside a large, white van, SPY is operating a fake cell tower. On SPY’s laptop screen, CEO’s movements and communications begin to appear.

SPY (speaking into headphone):
Okay, we got her.

While the above scene may feel ripped out of a script for the latest spy thriller, the truth is that fake cell towers present a real and pernicious mobile security risk, one that can give threat actors an extremely valuable foothold into an organization’s most valuable information.

I’ve taken a closer look at fake cell towers in an article for Security Magazine. Learn how these spying devices work, how criminals are using them and the available tools for mitigating their risks.


Topics: Mobile Security, Smartphone Hacking, Smartphone Vulnerabilities, IMSI Catchers

At Privoro, we’re laser-focused on creating first-of-their-kind tools for controlling mobile devices and protecting important information. Subscribe to our blog for an inside view of how we’re rethinking mobile security.

Subscribe Here!

Recent Posts