Security BSides CDMX conference
On July 26 Sergey Puzankov, Lead Security Researcher at Positive Technologies will be discussing his latest research on how SS7 vulnerabilities are being used to bypass any protection tools at Security BSides CDMX conference.
MWC Shanghai 2019
On 27th June, MWC19 Shanghai attracted more than 60,000 attendees from 550 leading companies across the globe. Positive Technologies came together with industry heavyweight titans at the Mobile World Congress to discuss the latest innovations such as 5G, IoT, AI and big data which are transforming the future of mobile. At the event, Positive Technologies experts led by CTO Dmitry Kurbatov showcased the company's research, analytics and pentesting exercises which highlighted the security flaws within 5G. They explored ways to mitigate potential risks, avoid repeating security mistakes of the past, and how to arm themselves against the myriad of challenges in the future
Positive Technologies researchers have discovered a number of vulnerabilities in a ZTE wifi router, used by 750-800 thousand devices globally. On June 5, Jimmy Jones, Telecoms Security Lead at Positive Technologies, will speak at InfoSecurity Europe in London.
DEF CON China 2019
The mobile world is moving to 5G. However, there are billions of subscribers who still use old 2G and 3G networks. These networks rely on the SS7 (Signaling System #7) protocol stack that was developed in the 1970s. The SS7 stack was supposed to be used as an isolated network within a small club of large telephone operators, so nobody thought about upper-layer security mechanisms. Further development of SS7 brought the possibility of sending signaling traffic over IP networks. Thus, the SS7 stack got vulnerabilities “by-design” that allow an external intruder to perform such attacks as location tracking, service disruption, SMS and voice call interception. Mobile operators, equipment vendors, and non-commercial organizations (such as the GSMA - the association of mobile operators) are aware of the problem. They develop and implement security solutions mitigating threats from SS7 networks.