Next-gen network security analysis
LTE network vulnerabilities
UMTS security assessment
GSM legacy vulnerabilities
Signaling System 7 attacks
AAA protocol vulnerabilities
IP-based signaling transport
GPRS tunneling protocol
Session Initiation Protocol
Voice over IP vulnerabilities
IP Multimedia Subsystem
SIM card attack vectors
Smartphone vulnerabilities
Cellular modem analysis
Mobile Threat Intelligence Framework
Testing and analysis tools
Visual security references
Technology comparisons
The adversary is trying to steal data