What SIM swapping is, and why business should care
SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.
9 articles
SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
In this edition of the Kaspersky Lab podcast, we discuss a pair of data breaches, a Tor SIM card, a leaky Tea Party AWS server, and more.
David and Jeff discuss Fortnite (again!), the T-Mobile data breach, and how a fish tank helped, in a way, with the development of the modern Internet.
In one of the previous installments of our GSM saga we mentioned an urban legend of hijacking encryption keys on the fly. It presupposes someone can clone your SIM card
Recently engineers who have been working to improve legacy cellular technologies, were stricken with a thought: “Why would one need a SIM card, if it’s nothing more than a protected data
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same