Please turn on your JavaScript for this page to function normally.

AdaptiveMobile Security

Rowland Corr
Leveraging mobile networks to threaten national security

In this interview with Help Net Security, Rowland Corr, Director of National Security Intelligence at AdaptiveMobile Security, explains how mobile networks can be leveraged as …

hunt
Using mobile networks for cyber attacks as part of a warfare strategy

AdaptiveMobile Security published a research which highlights how vulnerabilities in mobile network infrastructure could be weaponized in offensive military operations. …

Enea acquires AdaptiveMobile Security to strengthen its 5G network security portfolio

AdaptiveMobile Security announced that is has been acquired by Enea. Enea’s focus areas are cloud-native, 5G-ready products for data management, mobile video traffic …

AdaptiveMobile Security’s 5G security platforms protect mobile networks against cyber threats

AdaptiveMobile Security announced a new trio of interconnected 5G security platforms that allows carriers to protect against internal and external security threats to their 5G …

5G
5G network slicing vulnerability leaves enterprises exposed to cyberattacks

AdaptiveMobile Security today publicly disclosed details of a major security flaw in the architecture of 5G network slicing and virtualized network functions. The fundamental …

Simjacker
Simjacker vulnerability actively exploited to track, spy on mobile phone owners

Following extensive research, AdaptiveMobile Security has uncovered a new and previously undetected vulnerability. This vulnerability is currently being exploited and is being …

AdaptiveMobile Security launches Commercial Traffic Management

AdaptiveMobile Security launched ‘Commercial Traffic Management’ (CTM) controls for all forms of mobile messaging. This new proposition enables operators and aggregators to …

city night
New infosec products of the week​: September 15, 2017

FinalCode 5.3 extends the types of applications traditional IRM can support FinalCode updated its persistent, file-centric information rights management (IRM) solution. …

Don't miss

Cybersecurity news