Video Hub
Video

Cellular Vulnerabilities

Excerpt From Introduction to Wireless Threat Intelligence Webinar/
Find Out More on Cellular Vulnerabilities With CTO Dr. Brett Walkenhorst /
Cellular attacks can involve a number of standard techniques and possible outcomes. To enable security downgrade attacks, attackers frequently install rogue cell towers and force mobile devices to connect to them. Attackers are able to gain control over encryption levels and hack devices by taking use of flaws in earlier generations, such as 2G. Watch this clip below to learn more.

Close your cybersecurity gaps with AI-driven wireless visibility

See Bastille in action with a live demo from our experts in wireless threat detection.