Hunting the (Cyber)Hunters

Cyber threats are constantly multiplying and evolving, and a good defense isn’t good enough anymore. The safest approach to cyber threats is to hunt them down before they do damage, rather than reactively waiting for them to be uncovered.

How Vulnerable Are Mobile Networks and Devices?

From Making Sense of Cyber Security by Thomas Kranz

It’s easy to forget that phones are powerful computers in their own right, vulnerable to the same threats as laptops or desktops. Mobile networks also contain many vulnerabilities that attackers can leverage. This article gives an overview of how mobile networks communicate with mobile devices and the threats therein.

© 2023 Manning — Design Credits