Cellular Vulnerabilities

Excerpt From Introduction to Wireless Threat Intelligence Webinar

Find Out More on Cellular Vulnerabilities With CTO Dr. Brett Walkenhorst

Cellular attacks can involve a number of standard techniques and possible outcomes. To enable security downgrade attacks, attackers frequently install rogue cell towers and force mobile devices to connect to them. Attackers are able to gain control over encryption levels and hack devices by taking use of flaws in earlier generations, such as 2G. Watch this clip below to learn more.

Cellular Vulnerabilities — Bastille — Bastille

For more on Wireless Threat Intelligence:

For more information: