What will 2019 have in store for 5G Security?

By Prof. Dror Fixler, CEO of FirstPoint Mobile Guard

In May 2018, the 3GPP Committee defined the 5G Phase 1 architecture and gave us a taste of the new generation of the secure mobile communication system. The main use case for 5G Phase 1 was mobile broadband. 5G Phase 2, that will be defined at 2019, will bring solutions for the Internet of Things (IoT), covering several scenarios in the form of massive Machine Type Communication (mMTC) and Ultra-Reliable and Low Latency Communications (URLLC). mMTC relates to the very large number of devices transmitting a relatively low volume of non-delay-sensitive data and URLLC which relates to services with stringent requirements for capabilities such as throughput, latency, and availability (such as smart city driving assistance devices).

For mMTC, very low data-rates going down to few bits per day, we will have to consider the extent of security (be it authentication, confidentiality, integrity or otherwise) that can be provided. Several IoT or Machine-to-Machine (M2M) services and devices fall under this category, examples are temperature sensors giving hourly updates, logistic sensors tracking package location and health and smart city devices. Such devices will also be resource constrained in terms of battery, computation, and memory. For security, the requirement will be to reduce the overhead of security-related bits, e.g. for integrity, for every communication. The only manner in which cellular communication can be protected in this highly constraint environment is via a cellular network based solution, which does not impact battery, CPU, require any space for SW or HW components and fits any of the endless types of devices that will be used.

At the other end of the scale, URLLC devices will call for high data-rates with potentially higher battery and computational resources; examples include cars, Industrial IoT (IIoT) devices like factory machinery and virtual or augmented reality (VR or AR) devices – used for gaming or real-time services. Providing higher data rates also means that the throughput of security functions need to be considered to avoid processing delay.

Therefore, the real challenge for 2019 will be finding security solutions that enable large scale deployment of various use cases, without compromising on protection.

FirstPoint is ready for these challenges! FirstPoint’s one-of-a-kind network-based service is the ultimate solution.


Enterprises, defense organizations, MNOs and EPC providers – ultimate cellular cyber security is here.

Contact us today to find out more about protecting your people, your IP and your devices at info@firstpoint-mg.com. 

As featured by Intelligence Online

Learn more about FirstPoint in this featured article about us by Intelligence Online magazine.

FirstPoint unveils anti-interception SIM card

“Launched by two Israeli interceptions experts, the firm FirstPoint MG has developed a means to protect smartphones against intrusion and IMSI catchers using a simple SIM card….. FirstPoint’s algorithms detect attempts to identify, geolocate or intercept the phone…”

For the full article go to Intelligence Online Magazine .

FirstPoint finalists at Cyberweek Combating Terrorism Contest 2018

Root for us at TAU Cyberweek Combating Terrorism Technologies Startup Contest, presented by the US Department of Defense (CTTSO), Israel Ministry of Defense (MAFAT), and the MIT Enterprise Forum of Israel.

We’ll be competing on stage for fame and fortune. June 17, Tel Aviv University Cyberweek  2018

FirstPoint is excited to be selected as one of ten cherry-picked finalists in the competition, from over 130 applying startups.

“Our solutions for mobile phone and cellular IoT protection against hidden network vulnerabilities offer great added value for civilians and military alike. We are proud to take part in this important discussion about combating terrorism and keeping our cities, soldiers and people safe.” Prof. Dror Fixler, CEO, FirstPoint Mobile Guard

Read more

IoT Denial-of-Service and the MNO opportunity

Originally published on GSMA Mobile360 Series Insights Blog

By Prof. Dror Fixler, CEO of FirstPoint Mobile Guard


Dozens of remotely activated solar panels on rooftops in a village in rural Africa fail at providing electricity at nightfall and homes go dark. At a busy university campus event, the vending machines aren’t linking up to network and can’t process payments for hours. On a side street of a crowded city, a row of shops is vulnerable to no-witness burglaries, as surveillance cameras aren’t transmitting data. These events seem unconnected but could very well be the cause of local Denial-of-Service (DoS) attacks on the devices’ cellular connectivity.

DoS attacks are more than just a nuisance – they can create meaningful financial, operational or physical damage to businesses and individuals. As companies increasingly rely on connected devices for monitoring, operations, sales and customer service; hackers are turning to DoS attacks to take companies offline or steal their sensitive data. DoS attacks have been around since computers have been networked, and cellular IoT devices are no exception. DoS attacks via cellular networks are traditionally undetectable, unstoppable and do not leave a trace.

How do hackers roll out a cellular DoS attack? Every cellular device’s SIM has a unique IMSI (International Mobile Subscriber Identity), which identifies it to mobile networks. The IMSI serves as your “credentials” when you connect to the network. Attackers impersonate cell towers with devices called “IMSI catchers” (AKA fake cell towers / “Stingray” devices), and “convince” devices to connect to them by providing the “best” signal. Once a device is connected to the fake cell tower, it is no longer connected to the network and doesn’t receive service, hence a DoS attack is underway. Subsequent attacks can include providing the device with cellular connectivity while the hacker acts as a “man in the middle” (MiTM) between the device and the network. In a MiTM attack, hackers can gain access to the device’s sensitive information and even inject malicious code. With one simple IMSI catcher, hackers can roll out DoS attacks on thousands of IoT devices.

DoS via IMSI catchers is only one of the many possible attacks on cellular IoT devices. As remote, mobile and critical devices that are deployed globally, these IoT devices are prime targets for hackers, criminals, and even terrorists. Data duplication to malicious addresses, location monitoring, and operation manipulation are just some of the potential risks.

These scenarios are alarming, but they don’t have to become the reality. Companies can and should take measures to prepare themselves for attacks on business continuity and operations. Firstly, by assessing the level of risk from cellular DoS and data leakage attacks and secondly by setting out a plan to mitigate this risk via existing service providers or alternative 3rd party solutions.

MNOs have the opportunity to block cellular DoS and other network based attacks at the network level, in a way that no cloud-based solution can. MNOs can be the go-to source for cellular IoT cybersecurity, in addition to connectivity and management services.

Join Prof. Dror Fixler, CEO of FirstPoint Mobile Guard as he discusses unique cellular network based cyber-attacks on IoT devices in 2G-5G networks, the GSMA 5G standard approach to enhance protection, and as he presents FirstPoint Mobile Guard’s cellular network based IoT protection platform based on network elements. Prof. Dror Fixler will be speaking during the Safeguarding the Network session on Thursday, 31 May at 09:30 at Mobile 360 Series – Privacy & Security.

CEO Dror Fixler selected to speak at M360PS

FirstPoint is honored to be selected as one of only three startups to speak on stage at GSMA Mobile360 Series – Privacy & Security at The Hague this coming May.

CEO Prof. Dror Fixler will participate in the keynote session on “Safeguarding the network” to discuss security for mobile and IoT in the evolving cellular network landscape from 2G to 5G. May 31,2018 9:30 AM


Safeguarding the most sophisticated mobile phones and the simplest celluar IoT devices, against the most malicious threats.

No device software, no special hardware, no slowdowns, no updates.

Cellular network-based. Transparent. Agnostic. Comprehensive.

Read more

CEO Prof. Dror Fixler comments on IMSI catchers detected in DC by DHS, Infosecurity Magazine

CEO Prof. Dror Fixler comments on IMSI catchers detected in DC by DHS, Infosecurity Magazine “The Department of Homeland Security (DHS) has detected equipment that can eavesdrop on cell-phone conversations in the Washington, DC, area – and it doesn’t know who’s behind it. According to a letter sent to Sen. Ron Wyden (D-OR) obtained by the Associated Press (AP), DHS […]

FirstPoint @ RSA 2018, Israel Pavilion

FirstPoint will be exhibiting at RSA Conference 2018, for the first time!

We’re proud to be selected to stand with some excellent Israeli companies, in the Israel Pavilion.


Invisible privacy protection & cybersecurity for mobile phones and cellular IoT.

Unbelievable? See for yourself at RSA 2018.

Read more

FirstPoint @ MWC Barcelona 2018

Following a very successful run at MWC Americas,  and being selected as finalists in the 4YFN Cyber Security, Identity, Blockchain startup contest  – FirstPoint is joining in on the Barcelona excitement

We’ll be exhibiting at the 4YFN startup area, within MWC.


Invisible privacy protection & cybersecurity for mobile phones and cellular IoT.

Unbelievable? See for yourself at MWC 2018.

Read more

FirstPoint @ Cybertech Israel for the first time

FirstPoint is excited to be presenting alongside dozens of Israel’s top cybersecurity companies,  at Cybertech Israel 2018.


Invisible cybersecurity for mobile phones.

Unbelievable? See for yourself at Cybertech Israel 2018 .

Read more