Excerpt From Introduction to Wireless Threat Intelligence Webinar/
Find Out More on Cellular Vulnerabilities With CTO Dr. Brett Walkenhorst /
Cellular attacks can involve a number of standard techniques and possible outcomes. To enable security downgrade attacks, attackers frequently install rogue cell towers and force mobile devices to connect to them. Attackers are able to gain control over encryption levels and hack devices by taking use of flaws in earlier generations, such as 2G. Watch this clip below to learn more.
UPCOMING REPORT: The Need for Wireless Airspace Defense
Get early access