Resources Video

Cellular Vulnerabilities

Excerpt From Introduction to Wireless Threat Intelligence Webinar/
Find Out More on Cellular Vulnerabilities With CTO Dr. Brett Walkenhorst /
Cellular attacks can involve a number of standard techniques and possible outcomes. To enable security downgrade attacks, attackers frequently install rogue cell towers and force mobile devices to connect to them. Attackers are able to gain control over encryption levels and hack devices by taking use of flaws in earlier generations, such as 2G. Watch this clip below to learn more.

We’d love to show you around

Learn how Bastille can help you prepare you for today’s ever-growing wireless threat landscape, and schedule a demo and we’ll be in touch shortly.