FirstPoint finalists at Cyberweek Combating Terrorism Contest 2018

Root for us at TAU Cyberweek Combating Terrorism Technologies Startup Contest, presented by the US Department of Defense (CTTSO), Israel Ministry of Defense (MAFAT), and the MIT Enterprise Forum of Israel.

We’ll be competing on stage for fame and fortune. June 17, Tel Aviv University Cyberweek  2018

FirstPoint is excited to be selected as one of ten cherry-picked finalists in the competition, from over 130 applying startups.

“Our solutions for mobile phone and cellular IoT protection against hidden network vulnerabilities offer great added value for civilians and military alike. We are proud to take part in this important discussion about combating terrorism and keeping our cities, soldiers and people safe.” Prof. Dror Fixler, CEO, FirstPoint Mobile Guard

Read more

IoT Denial-of-Service and the MNO opportunity

Originally published on GSMA Mobile360 Series Insights Blog

By Prof. Dror Fixler, CEO of FirstPoint Mobile Guard


Dozens of remotely activated solar panels on rooftops in a village in rural Africa fail at providing electricity at nightfall and homes go dark. At a busy university campus event, the vending machines aren’t linking up to network and can’t process payments for hours. On a side street of a crowded city, a row of shops is vulnerable to no-witness burglaries, as surveillance cameras aren’t transmitting data. These events seem unconnected but could very well be the cause of local Denial-of-Service (DoS) attacks on the devices’ cellular connectivity.

DoS attacks are more than just a nuisance – they can create meaningful financial, operational or physical damage to businesses and individuals. As companies increasingly rely on connected devices for monitoring, operations, sales and customer service; hackers are turning to DoS attacks to take companies offline or steal their sensitive data. DoS attacks have been around since computers have been networked, and cellular IoT devices are no exception. DoS attacks via cellular networks are traditionally undetectable, unstoppable and do not leave a trace.

How do hackers roll out a cellular DoS attack? Every cellular device’s SIM has a unique IMSI (International Mobile Subscriber Identity), which identifies it to mobile networks. The IMSI serves as your “credentials” when you connect to the network. Attackers impersonate cell towers with devices called “IMSI catchers” (AKA fake cell towers / “Stingray” devices), and “convince” devices to connect to them by providing the “best” signal. Once a device is connected to the fake cell tower, it is no longer connected to the network and doesn’t receive service, hence a DoS attack is underway. Subsequent attacks can include providing the device with cellular connectivity while the hacker acts as a “man in the middle” (MiTM) between the device and the network. In a MiTM attack, hackers can gain access to the device’s sensitive information and even inject malicious code. With one simple IMSI catcher, hackers can roll out DoS attacks on thousands of IoT devices.

DoS via IMSI catchers is only one of the many possible attacks on cellular IoT devices. As remote, mobile and critical devices that are deployed globally, these IoT devices are prime targets for hackers, criminals, and even terrorists. Data duplication to malicious addresses, location monitoring, and operation manipulation are just some of the potential risks.

These scenarios are alarming, but they don’t have to become the reality. Companies can and should take measures to prepare themselves for attacks on business continuity and operations. Firstly, by assessing the level of risk from cellular DoS and data leakage attacks and secondly by setting out a plan to mitigate this risk via existing service providers or alternative 3rd party solutions.

MNOs have the opportunity to block cellular DoS and other network based attacks at the network level, in a way that no cloud-based solution can. MNOs can be the go-to source for cellular IoT cybersecurity, in addition to connectivity and management services.

Join Prof. Dror Fixler, CEO of FirstPoint Mobile Guard as he discusses unique cellular network based cyber-attacks on IoT devices in 2G-5G networks, the GSMA 5G standard approach to enhance protection, and as he presents FirstPoint Mobile Guard’s cellular network based IoT protection platform based on network elements. Prof. Dror Fixler will be speaking during the Safeguarding the Network session on Thursday, 31 May at 09:30 at Mobile 360 Series – Privacy & Security.

CEO Dror Fixler selected to speak at M360PS

FirstPoint is honored to be selected as one of only three startups to speak on stage at GSMA Mobile360 Series – Privacy & Security at The Hague this coming May.

CEO Prof. Dror Fixler will participate in the keynote session on “Safeguarding the network” to discuss security for mobile and IoT in the evolving cellular network landscape from 2G to 5G. May 31,2018 9:30 AM


Safeguarding the most sophisticated mobile phones and the simplest celluar IoT devices, against the most malicious threats.

No device software, no special hardware, no slowdowns, no updates.

Cellular network-based. Transparent. Agnostic. Comprehensive.

Read more

FirstPoint @ RSA 2018, Israel Pavilion

FirstPoint will be exhibiting at RSA Conference 2018, for the first time!

We’re proud to be selected to stand with some excellent Israeli companies, in the Israel Pavilion.


Invisible privacy protection & cybersecurity for mobile phones and cellular IoT.

Unbelievable? See for yourself at RSA 2018.

Read more

FirstPoint @ MWC Barcelona 2018

Following a very successful run at MWC Americas,  and being selected as finalists in the 4YFN Cyber Security, Identity, Blockchain startup contest  – FirstPoint is joining in on the Barcelona excitement

We’ll be exhibiting at the 4YFN startup area, within MWC.


Invisible privacy protection & cybersecurity for mobile phones and cellular IoT.

Unbelievable? See for yourself at MWC 2018.

Read more

FirstPoint @ Cybertech Israel for the first time

FirstPoint is excited to be presenting alongside dozens of Israel’s top cybersecurity companies,  at Cybertech Israel 2018.


Invisible cybersecurity for mobile phones.

Unbelievable? See for yourself at Cybertech Israel 2018 .

Read more