We all just want our devices to talk to each other, instantaneously, with a clean signal, no latency, and nobody listening in. Is that too much
Securing the devices and systems that access your corporate network has been an essential component of corporate data security policies for as long as the Internet
The subject discussed today is 5G security, assessing the risks to various groups and ways to mitigate these risks. Today, we’ll map thea 5G threat landscape
Even 5G networks are far from bulletproof 4G, Long Term Evolution (LTE) cellular networks, are currently providing the backbone of cellular communication and are leading in
There are many cyber threats out there. Usually, they’re motivated by money or political gain, but it can also be simple mischief. However, motivation is of
Earlier this month, Apple Inc. announced a proposal for a simple security upgrade of SMS 2FA codes. However, reading the fine print (or actually just the
If you think Face ID or fingerprint scanners are keeping the data in your smartphone safe, you are gravely mistaken. International Mobile Subscriber Identity (IMSI) Catchers
Dozens of remotely activated solar panels on rooftops in a village in rural Africa fail at providing electricity at nightfall and homes go dark. At a
Global mobile use has been on a major upswing for quite some time. From toddlers who learn to operate a mobile phone before they can even