<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

Is your Bitcoin wallet safe? Or can SS7 flaws and bad 2FA compromise it?

[fa icon="calendar'] Oct 30, 2017 7:14:17 PM / by Stefan Topuzov

We have written about the almost infinite possibilities for surveillance and malicious activity presented by flaws in the Signaling System 7 (SS7) protocol used by virtually all mobile networks worldwide. A security research firm recently demonstrated how the same exploit can be used to drain a Bitcoin wallet. Which certainly drives home the point about how easy subverting (otherwise reliable) security systems can be.

Read More ...

[fa icon="comment"] 0 Comments

6 ways your phone can get hacked

[fa icon="calendar'] Sep 11, 2017 6:57:41 PM / by Stefan Topuzov

Is someone trying to hack your phone? The answer to this question is most likely “yes” – regardless of whether you are a person of particular interest to hackers or not. The average Joe may not be the CEO of a petroleum or pharmaceutical company, but there is still money to be made in hacking their device and extracting data. Here is how attackers do that.

Read More ...

[fa icon="comment"] 0 Comments

Fixing SS7 vulnerabilities: What is being done and what you can do

[fa icon="calendar'] Sep 4, 2017 5:50:02 PM / by Stefan Topuzov

Last week we went over the security risk related to vulnerabilities in the SS7 protocol. Long story short: if you don't like your calls and messages being listened to and read by anyone, and prefer your bank account not to be drained, this concerns you. So, let’s take a look at the ways this type of hacking can be prevented.

Read More ...

[fa icon="comment"] 0 Comments

Phone hacking through SS7 is frighteningly easy and effective

[fa icon="calendar'] Aug 28, 2017 5:38:58 PM / by Stefan Topuzov

Imagine a world in which a low-budget hackers can track your every move, listen to your calls, read your texts, drain your bank account, and so on. All of this without leaving their rooms, and from a continent away. Imagine no more. Due to vulnerabilities in the SS7 protocol, this is the world in which you live right now.

Read More ...

[fa icon="comment"] 0 Comments

How vulnerabilities in SS7 protocol expose all mobile networks to attacks

[fa icon="calendar'] Jun 12, 2017 7:27:24 PM / by Stefan Topuzov

If you were an intelligence agency, your dream would be to monitor anyone, anywhere in the world, right? The inherent vulnerabilities of SS7, a protocol used by network operators around the globe, make this dream a reality. Cybercriminals have also exploited these flaws to drain bank accounts. Here is what you need to know about SS7 and how to keep your data safe.

Read More ...

[fa icon="comment"] 1 Comment

  • SecureGroup
  • SecureGroup

Recent Posts

Some additional information in one line