medium import medium import | Sirin Labs
Home / medium import / Tagged: Exploit

What exactly is a mobile ______ attack?

Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the greatest return on their investment … Read More

The post What exactly is a mobile ______ attack? appeared first on Zimperium Mobile Security Blog.

What the Wh@T? What exactly is a mobile ______ attack?

Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the greatest return on their investment … Read More

The post What the Wh@T? What exactly is a mobile ______ attack? appeared first on Zimperium Mobile Security Blog.

aLTEr: POC Exploit of LTE Layer Two

Long Term Evolution (LTE) is the latest mobile telephony standard designed to bring many security improvements over the predecessor standard known as the Global System for Mobile (GSM). In a new research paper, security researchers from Ruhr-Universität Bochum and New York University Abu Dhabi outline attacks that could allow sophisticated hackers to spy on users’ … Read More

The post aLTEr: POC Exploit of LTE Layer Two appeared first on Zimperium Mobile Security Blog.