Countering SIM-Swapping
In this study, we give an overview of how SIM-Swapping attacks work, list measures that providers can take to mitigate the attack and make recommendations for policy makers and authorities in the telecom sector and other sectors. Security of…
How to Avoid SIM-Swapping - Leaflet
This leaflet, addresses the SIM-swapping attacks, how to recognise them and how to mitigate the risk connected to this fraud. In fact, subscriber Identity Module (SIM) swapping is a legitimate procedure performed by a customer to change their SIM…
Beware of the Sim Swapping Fraud!
How do Sim Swapping attacks work and what can you do to protect yourself? Learn it all in the new technical deep dive by the European Union Agency for Cybersecurity.
Unveiling the Telecom Cybersecurity Challenges
The European Union Agency for Cybersecurity (ENISA) publishes one report on eSIMs and a second one on fog and edge computing in 5G. Both reports intend to provide insights on the challenges of these technologies.
EU Telecom Security Authorities discuss the challenges of Over-the-top Communications Services Supervision
The European Union Agency for Cybersecurity hosted the 34th meeting of the European Competent Authorities for Secure Electronic Communications (ECASEC).
EU Electronic Communications Security Authorities Discussion on Incident reports and Policy
ENISA hosted the 33rd meeting of European Competent Authorities for Secure Electronic Communications (ECASEC). The group is comprised of EU authorities on security of electronic communications, formerly known as the ENISA Article 13a group.
EU National Telecom Authorities analyse Security Supervision and Latest Security Threats
The EU National Telecom Authorities met in Athens, Greece for the 35th meeting of the ECASEC group. The European Union Agency for Cybersecurity also hosted the 1st Telecom Security Forum on this occasion.
Pagination