Mobile Networks

How DDoS Attacks Are Different for Service Providers
Protecting Service provider’s large-scale network is different, most service providers implement a DDoS protection after the fact. The post How DDoS Attacks Are Different for Service Providers appeared first on Radware Blog ...
CISA Strategy for 5G Security and Resilience
In August 2020, the Cybersecurity and Infrastructure Security Agency (CISA) released its strategy to ensure the security and resilience of 5G infrastructure in the United States. Roughly every 10 years, the next ...
The Cybersecurity Implications of 5G Technology
The coming of widespread 5G technology promises more than just faster everything, enhanced capacity and greater reliability. Leading proponents of the wonders of 5G, such as the theoretical physicist and author Michio ...

A Flawed Network, By Any Other Name…
via Lily Hay Newman, writing for Wired Magazine, comes this outstanding piece on the extant tally of known flaws within deployments of 5g networking hardware infrastructure. H/T '"The thing I worry about ...

Krebs On Security: Brilliant Exposé Of US Wireless Carriers
Fellow member of the Security Bloggers Network - Brian Krebs and his superlative blog Krebs On Security provides a tour de force exposé of the unfortunate current security posture of the wireless ...

The Story: Vermont State Official Proves Carrier Claims Of Coverage Are Hogwash
Image Credit: Vermont.org John Dillon writing at Vermont Public Radio, brings forth the true story of Cory Chase, a State of Vermont Telecommunications Infrastructure Specialist and his quest to accurately detail mobile ...

The Three
Three US Based Mobile Providers Still Selling User Location Data The bad news was delivered to me on Tuesday afternoon by this outstanding post by Jon Brodkin, reporting for Ars Technica. Read ...

A Cornucopia of Flaws, The LTE Debacle
via Sean Gallagher, writing at Ars Technica, comes the astounding story of mobile telephony flaws extraordinaire. Also known as the vector of choice for espionage, network intrusion, and data exfiltration. Today's MustRead ...