Cellular Vulnerabilities
Excerpt From Introduction to Wireless Threat Intelligence Webinar
Find Out More on Cellular Vulnerabilities With CTO Dr. Brett Walkenhorst
Cellular attacks can involve a number of standard techniques and possible outcomes. To enable security downgrade attacks, attackers frequently install rogue cell towers and force mobile devices to connect to them. Attackers are able to gain control over encryption levels and hack devices by taking use of flaws in earlier generations, such as 2G. Watch this clip below to learn more.