The Era of IoT Regulation

Click Here to Access the Full Webinar The internet of things (IoT) has been a part of our lives for some time now. What’s new though, is magnitude of growth we’ve seen in IoT – both with devices and connections. And this spans our professional and personal lives. In fact, according to a recent report…

New Mobile Network Vulnerabilities Affect All Cellular Generations Since 2G

Researchers have disclosed security vulnerabilities in handover, a fundamental mechanism that undergirds modern cellular networks, which could be exploited by adversaries to launch denial-of-service (DoS) and man-in-the-middle (MitM) attacks using low-cost equipment. The “vulnerabilities in the handover procedure are not limited to one handover case only but they impact all different handover cases and scenarios…