Home » Blog » Blog » Page 3
Categories for Blog
May 11, 2021 7:00 am
Published by John O'Hara
Flubot and smishing solutions are needed as mobile subscribers are under attack. Smishing techniques vary and often incorporate other touch points, such as calling the victim impersonating a trusted entity and using social engineering to trick the victim into giving away sensitive information. We will describe the most basic and common smishing technique, however there are many variations to this attack.
May 7, 2021 11:35 am
Published by John O'Hara
Mobile subscribers and networks are under attack. We will describe the most common Flubot attacks currently seen, and offer solutions to this new plague of phishing malware
May 3, 2021 11:47 pm
Published by John O'Hara
Flubot and smishing have mobile subscribers under attack, and yet despite solutions to these problems, operators continue to issue warnings, missing a big opportunity to set themselves apart.
April 29, 2021 7:55 pm
Published by Jon Neighbour
MNOs have begun to look in earnest towards the 2G/3G sunset, where they can finally switch off these legacy technologies.... View Article
April 29, 2021 7:54 pm
Published by Daniel McTague
We frequently see marketing from MNOs about the availability of 5G services, and also the announcement of 5G roaming agreements... View Article
April 26, 2021 6:15 pm
Published by Laragh Larsen
Cut through the noise and securely reach your audience with reliable A2P Cellusys teamed up with Telia Carrier to present... View Article
March 26, 2021 4:15 pm
Published by Bonnie Kimmel
4th consecutive year in Tier 1 and winner in 35/36 benchmarks DUBLIN, IRELAND, IRELAND, March 26, 2021 – Mobile operators... View Article
March 20, 2021 12:11 am
Published by Bonnie Kimmel
Risk and Assurance Group Television S3E11 explores the role of signalling control in managing fraud and security in mobile networks.... View Article
December 22, 2020 9:50 pm
Published by Bonnie Kimmel
Join Kaleido Intelligence and Cellusys for a free webinar addressing the current state of mobile network security and how Operators can ensure best-in-class protection from a world of evolving tech threats.
November 26, 2020 9:00 am
Published by Bonnie Kimmel
The Cellusys Steering of Roaming solution powers a unified approach to roaming for Telenor Group affiliates.
November 10, 2020 11:35 pm
Published by Bonnie Kimmel
Nov 11-12 2020 – Virtual Event The topics for Thrive this year include Digital Resistance and 5G. This means protecting... View Article
October 5, 2020 5:31 pm
Published by Bonnie Kimmel
Brendan Cleary is moving into the position of CEO and is now one of three executives that began their careers with Cellusys from university internships: John O’Hara will move into the position of COO, and Daniel McTague remains as CTO.
September 21, 2020 6:41 pm
Published by Bonnie Kimmel
Cellusys Voted #1 Steering of Roaming Vendor in Independent 2020 Rocco Report Cellusys, a telecommunications solutions provider has been announced... View Article
September 10, 2020 11:48 am
Published by Bonnie Kimmel
Among all the good work that TSF does, one project for us stood out among others: mLearning for Syrian children.
July 22, 2020 1:30 am
Published by Daniel McTague
Many operators seem to want it both ways: they want everyone to use SMS for 2FA, and reap the rewards in revenue - but at first sign of a security issue, the response is “SMS isn’t secure anyway.”
May 15, 2020 11:41 am
Published by Steve DeVries
What is Diameter? Diameter is one of several defined Authentication, Authorization, and Accounting (AAA) protocols. What does that really mean?... View Article
March 30, 2020 11:23 am
Published by Bonnie Kimmel
Coronavirus pandemic taxes crucial communication services globally Dublin, March 26, 2020 – Cellusys, a global mobile telecoms solutions company, is... View Article
March 17, 2020 3:32 pm
Published by Dawood Ghalaieny
With advances in Cellusys technology St Patrick had to change his message to the lucky four-leaf clover to take account... View Article
February 21, 2020 10:00 am
Published by Charles Bernard
Customized Pricing “While companies may be tempted to focus on cost, as they have done for many years, the best... View Article
February 20, 2020 10:00 am
Published by Charles Bernard
#4 Security Hackers and other bad actors are constantly seeking (and finding) new vulnerabilities in networks, and access points to... View Article