
A great segment from 60 minutes Australia on security and privacy hacking on the cell phone network around the world. This segment demonstrates how a simple radio antenna with parts costing around $100 can act as a mobile cellphone tower and intercept all communications.
The technology is based upon IMSI Catching. If you want to monitor these fake networks in your area you can install an app on your Android phone called Android IMSI-Catcher Detector. We highly recommend this app if you use an Android phone. These devices are essentially false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. They are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as “StingRay“.
Related Posts
Fast Flux Attacks Explained and How to Prevent Data Exfiltration
Find out how "fast fluxing," a technique used by cybercriminals and rogue nations to hide their online actions, poses a risk to national security and how BlackFog's technology stops sensitive data from being stolen.
Black Basta Ransomware: Protection, Prevention, and Recovery Guide
Learn how to stay safe from Black Basta ransomware group with advice on how to spot, prevent, and recover from attacks. Understand how these attacks work, explore real-life examples, and discover strategies to protect against ransomware.
Ascension Ransomware Attack: Impact and Prevention Tips
Learn how the Ascension ransomware attack disrupted healthcare services, the financial consequences, and the cybersecurity lessons it taught. Also receive advice on protecting patient data and preventing similar attacks in the future.
Essential Data Loss Prevention Best Practices Every Firm Should Know
Following these seven data loss prevention best practices can help any firm reduce the risk of falling victim to threats like ransomware.
BlackFog Report Reveals Record Number of Ransomware Attacks from January to March
BlackFog reports a record-breaking surge in ransomware attacks Q1 2025, with 278 disclosed cases and a 113% rise in undisclosed incidents.
AI for Network Security and Monitoring: Enhancing Cyber Defense
What opportunities do AI ransomware protection tools offer to cybersecurity pros?