A great segment from 60 minutes Australia on security and privacy hacking on the cell phone network around the world. This segment demonstrates how a simple radio antenna with parts costing around $100 can act as a mobile cellphone tower and intercept all communications.
The technology is based upon IMSI Catching. If you want to monitor these fake networks in your area you can install an app on your Android phone called Android IMSI-Catcher Detector. We highly recommend this app if you use an Android phone. These devices are essentially false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. They are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as “StingRay“.
Related Posts
Manufacturing Industry Faces Surge in Ransomware Attacks in 2024
Ransomware attacks on the manufacturing industry are rising, with notable cases at MKS Instruments, Brunswick Corporation, Simpson Manufacturing, and The Clorox Company. Learn about the financial and operational impacts and why manufacturers are prime targets for cybercriminals.
The State of Ransomware 2024
BlackFog's state of ransomware report measures publicly disclosed and non-disclosed attacks globally.
Enterprise Ransomware Protection: Why it Matters
Why must enterprise ransomware protection be a critical component of any firm's cyber security strategy?
TAG Blog Series 1 – How ADX Supports and Implements Policy
Implementing Anti Data Exfiltration (ADX) solutions is critical for enterprise security. This article provides guidance on establishing effective ADX deployment policies, with a focus on aligning them with business objectives and threat perceptions. Highlighting BlackFog's ADX solution, it explores proactive strategies to prevent data exfiltration, offering valuable insights for practitioners aiming to enhance their security posture.
5 Steps to Ensure Your Enterprise Data Security
Why do enterprise data security strategies need to evolve to cope with a new range of threats?
Ransomware Recovery: Key Steps Every Firm Should Know
What should businesses keep in mind in order to develop an effective ransomware recovery plan?