Migrating mobile networks to 5G: a smooth and secure approach
September 23, 2020
Download our new whitepaper "Migrating mobile networks to 5G: a smooth and secure approach" to learn about security flaws lurking in 5G NSA configurations during the transition period.
Threat vector: GTP. Vulnerabilities in LTE and 5G networks 2020
June 10, 2020
With new 5G networks, mobile operators face numerous challenges. One of them is the GTP protocol, used alongside SS7 and Diameter on core networks to transmit user and control traffic. Stay ahead of the curve with knowledge and preparation. Download the «Threat vector: GTP. Vulnerabilities in LTE and 5G networks 2020» report now!
What should network operators be on the lookout for during COVID-19?
April 15, 2020
Telecom networks are a crucial part of society. They provide services, applications, and communication channels that we simply cannot do without. It’s a critical industry, not just because of the billions of users connected all over the world, but because of the other industries and services that rely on the infrastructure - not least the emergency services.
Security assessment of Diameter networks
March 26, 2020
Research into diameter reveals the underpinning protocol’s biggest threat to 4G users is denial of service
Telecom Attack Discovery is the most well-rated signaling firewall 2020
March 24, 2020
For the second time in a row, Positive Technologies has been ranked the number 1 signaling firewall provider in the bi-annual ROCCO Signalling Firewall Vendor Performance Report.
SS7 network security analysis report
February 18, 2020
Whilst the industry is distracted by 5G, Positive Technologies experts lift the lid on the vulnerabilities and threats which plague the 2G/3G networks. The SS7 protocol which is actively used in these previous generation networks can potentially open the floodgates for hackers to exploit - from tracking user location to listening in on calls. Positive Technologies’ SS7 network security analysis report is a deep-dive analysis of the SS7 network threats and recommendations of how telecom operators can protect themselves from this issue which will be a part of the telecoms ecosystems in years to come. The report monitored these vulnerabilities throughout 2019. Companies can use this insight to help them navigate the challenges throughout 2020.
5G signaling networks: blast from the past
December 18, 2019
Each generation of mobile networks must interoperate with previous ones. As a result, newer generations inherit the weaknesses of their predecessors. In the first of a series of four reports on telecom security, we look to tackle the misconception that 5G will not be affected by existing security vulnerabilities in mobile networks.
Internet Of Things (IoT) Security
Updated: March 11, 2020
Internet of Things (IoT) devices are rapidly growing in number worldwide. Learn about the main challenges to IoT security and how to manage them.
First steps for mitigating Simjacker-related risks right now
September 17, 2019
There is nothing that subscribers can do about Simjacker attacks. The vast majority of mobile operators provide SIM cards with STK pre-installed. It is not possible to disable STK on the mobile device itself. Therefore, the job of security falls squarely with mobile operators. And now for the good news. Almost any operator equipment that handles SMS traffic has the capability to reduce the risk of Simjacker exploitation.
5G security issues
July 11, 2019
New-generation 5G networks will be based on existing technologies such as SS7 and Diameter—both of which contain plenty of vulnerabilities. The flexibility of 5G networks means a higher likelihood of configuration mistakes. Making things even more urgent is the growing number of vulnerable IoT devices. Achieving durable security will require concerted efforts by telecom vendors and operators.