Categories for Blog

Anatomy of a Smishing Attack – Flubot and Smishing Solutions Part 2/7

May 11, 2021 7:00 am Published by

Flubot and smishing solutions are needed as mobile subscribers are under attack. Smishing techniques vary and often incorporate other touch points, such as calling the victim impersonating a trusted entity and using social engineering to trick the victim into giving away sensitive information. We will describe the most basic and common smishing technique, however there are many variations to this attack.

VoLTE Steering

April 29, 2021 7:55 pm Published by

MNOs have begun to look in earnest towards the 2G/3G sunset, where they can finally switch off these legacy technologies.... View Article

5G Steering

April 29, 2021 7:54 pm Published by

We frequently see marketing from MNOs about the availability of 5G services, and also the announcement of 5G roaming agreements... View Article

Diameter and 3GPP

May 15, 2020 11:41 am Published by

What is Diameter? Diameter is one of several defined Authentication, Authorization, and Accounting (AAA) protocols. What does that really mean?... View Article