Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 3 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Positive Technologies launches PT VIP Protect to allow mobile operators to safeguard high-profile figures from targeted phone hacks

by The Gurus
February 9, 2017
in Editor's News, News
Share on FacebookShare on Twitter

Cyber security company Positive Technologies has today launched PT VIP Protect, a technology designed to keep sensitive targets safe from the current and evolving threats from mobile phone hacking.  Key business executives, celebrities, and other high-profile individuals operating in sensitive situations all connect to mobile phone networks, which often have fundamental flaws in underlying signalling protocols.
These flaws and vulnerabilities can be exploited to eavesdrop on phone conversations, intercept text messages, track location and commit fraud. It is also possible to forward calls to an alternate number, or kill phone connections entirely.
The new PT VIP Protect allows operators to monitor and automatically detect anomalous network activity, providing their internal teams with actionable notifications.  The technology is deployed and directly managed by the operator, no information is ever required to leave the network. All reporting, notifications and resolution are done by the in-house team and the technology does not directly capture any personal voice, text or data traffic.
Addressing the need for PT VIP Protect Michael Downs, Director of Telecoms Security at Positive Technologies explains, “Globally, mobile operators are becoming more aware of the customer risks created by vulnerabilities in the infrastructure they interconnect with. While the general public may not have heard of the complex array of signalling vulnerabilities, there is a growing awareness of the privacy dangers from hacking. This used to be just a technical issue, but recently it has become a brand reputation problem and mobile operators are increasingly sensitive about the churn it causes. PT VIP Protect allows providers to differentiate by offering a premium protection service.”
How PT VIP Protect works:
After deploying the technology, operators can offer dedicated security services to mobile subscribers who require a premium level of scrutiny – either on a temporary or permanent basis. PT VIP Protect allows operators to monitor accounts 24/7 for suspicious activity indicating an attack, which is immediately flagged to security operations teams, with recommendations for action.
The mobile operator using the technology is able to generate on-demand reports that detail:

  • ­All attempts (successful or not) to use SS7 flaws to interfere with a VIP user’s service
  • The type of attacks attempted (SMS interception, eavesdropping, location tracking, etc.)
  • ­The source of each attempted attack to the Global Title (GT) level, Source network, Country
  • The recommended course of remedial action to address or block the threat.

Downs concludes, “With this service, mobile operators can provide users in sensitive situations with additional reassurance. Using the reports, and depending on the type and severity of attacks, operators can reassure high-profile clients and take appropriate action. Operators can also use the intelligence collected to advise clients if further action is needed – such as updating social media and banking passwords, or reporting attack attempts to law enforcement agencies.”
To find out more about PT VIP Protect, Positive Technologies and its other solutions, visit Positive Technologies’ website.
ENDS
 
Notes to Editor:

  • Signalling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) and mobile networks exchange information over a digital signalling network. Nodes in an SS7 network are called signalling points.
  • SS7 is used for these and other services:

o   Setting up and managing the connection for a call
o   Tearing down the connection when the call is complete
o   Billing
o   Managing call forwarding, calling party name and number display, three-way calling, and other Intelligent Network (IN) services
o   Toll-free (0800) and Premium Service calls
o   Wireless as well as wireline call service including mobile telephone subscriber authentication, personal communication service (PCS), and roaming
 
About Positive Technologies:
Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection. Commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on Industrial Control System, Banking, Telecom, Web Application, and ERP security, supported by recognition from the analyst community. ptsecurity.com, facebook.com/PositiveTechnologies, facebook.com/PHDays, twitter.com/ptsecurity  

FacebookTweetLinkedIn
ShareTweet
Previous Post

Varonis to Demo New Investigation Capabilities and Configurable Security Dashboard at RSA Conference 2017

Next Post

Spring 2017 Release of Market-leading Malware Protection Solution Eliminates Browser-based Exploits, Accelerates Incident Investigation, and Alerts on Anomalous Network Traffic.

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information