Tag: Cellular
-
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat …
-
Google Using Clang Sanitizers to Protect Android Against Cellular Baseband Vulnerabilities
Google is highlighting the role played by Clang sanitizers in hardening the security of the cellular baseband in the Android operating …
-
New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode
Cybersecurity researchers have documented a novel post-exploit persistence technique on iOS 16 that could be abused to fly under the radar …
-
Industrial Cellular Routers at Risk: 11 New Vulnerabilities Expose OT Networks
Several security vulnerabilities have been disclosed in cloud management platforms associated with three industrial cellular router vendors …
-
New Mobile Network Vulnerabilities Affect All Cellular Generations Since 2G
Researchers have disclosed security vulnerabilities in handover, a fundamental mechanism that undergirds modern cellular networks, which …
-
Cellular Connectivity at the Forefront of Network Security
Embedding cellular technology in a business continuity plan allows organizations to scale the network as needed, offer further security for …
-
TrickBot Comes to Cellular Carriers
Researchers have discovered that TrickBot, a credential-theft botnet operated by the Gold Blackburn threat group, has been modified to …
-
Cellular networks flaws expose 4G & 5G devices to IMSI capturing attacks
The findings of their research have been published in a paper titled “Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using …
-
F5 Details Cellular Gateway IoT Flaws at Black Hat
VIDEO: Justin Shattuck, Principal Threat Researcher for F5 Labs explains how he discovered flaws in cellular gateways that could be putting …
-
NetMotion launches an IT platform to keep tabs on corporate smartphones
BigStock Image Smartphones have been around for a while, but IT departments are still trying to grapple with a challenge they’ve created: …
●●●