LTE - Cyber Security Review
Menu

Cyber Security Review

News • Insights • Analysis

Primary Menu

Skip to content
  • About
    • Advanced Persistent Threat
    • Artificial Intelligence
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – March 2026
    • News – February 2026
    • News – January 2026
    • News – December 2025
    • News – November 2025
    • News – October 2025
    • News – September 2025
    • NEWS ARCHIVE
  • Articles
  • Events
  • Editorial
  • Subscribe
  • Advertise
Search

Tag: LTE

Android patches incoming for NAS-ty memory overwrite flaw

Posted onJune 3, 2022June 6, 2022

A critical flaw in the LTE firmware of the fourth-largest smartphone chip biz in the world could be exploited over the air to block people’s communications and deny services. The vulnerability in the baseband – or radio modem – of Read More …

CategoriesNews June 2022TagsAndroid, Exploit, Hardware, LTE, Security Update, Telecommunications, Vulnerability

Bugs in billions of WiFi, Bluetooth chips allow password, data theft

Posted onDecember 13, 2021December 15, 2021

Researchers at the University of Darmstadt, Brescia, CNIT, and the Secure Mobile Networking Lab, have published a paper that proves it’s possible to extract passwords and manipulate traffic on a WiFi chip by targeting a device’s Bluetooth component. Modern consumer Read More …

CategoriesNews December 2021TagsBluetooth, Exploit, Hardware, LTE, Vulnerability, Wi-Fi

Researchers Uncover New Attacks Against LTE Network Protocol

Posted onJune 29, 2018July 9, 2018

If your mobile carrier offers LTE, also known as the 4G network, you need to beware as your network communication can be hijacked remotely. A team of researchers has discovered some critical weaknesses in the ubiquitous LTE mobile device standard Read More …

CategoriesNews June 2018TagsExploit, LTE, Network Security, Security, Telecommunications, Vulnerability

LATEST ARTICLES


A BEGINNER’S ROADMAP: HOW TO START YOUR AI SOC AGENT IMPLEMENTATION
By Kirsten Doyle
Cyber Security Review online – November 2025


THE PEOPLE BEHIND THE PIXELS: WHY CYBERSECURITY IN CRITICAL INDUSTRIES IS MORE HUMAN THAN EVER
Cyber Security Review online – July 2025


HOW TO MAXIMIZE EXCHANGE SERVER UPTIME? - SOME BEST PRACTICES
Cyber Security Review online – June 2025


KEY METRICS TO TRACK WHEN IMPLEMENTING AI IN YOUR SOC
By Josh Breaker-Rolfe
Cyber Security Review online – December 2024


ACHIEVING DATA SECURITY RESILIENCE WITH DSPM TOOLS
By Katrina Thompson
Cyber Security Review online – November 2024


CYBER SECURITY IN CRITICAL INDUSTRIES: CHALLENGES, SOLUTIONS, AND THE ROAD AHEAD
Cyber Security Review online – August 2024


HOW TO ENGAGE YOUR EMPLOYEES IN SECURITY AWARENESS TRAINING
Cyber Security Review online – April 2024


WHY IMMINENT SEC CYBER RULE CHANGES MEANS CYBER SECURITY LEADERSHIP MUST COME FROM THE VERY TOP
By Miguel Clarke, GRC and Cyber Security lead for Armor Defense
Cyber Security Review online – November 2023


WHAT COULD YOU DO IF YOU KNEW HOW EVERY PIECE OF DATA WAS BEING USED?
By Ross Moore, Cyber Security Support Analyst with Passageways
Cyber Security Review online – October 2023

A BRIEF HISTORY OF DATA LOSS PREVENTION
Cyber Security Review online –  July 2023


THE 5 ESSENTIAL CYBERSECURITY AWARENESS TRAINING TIPS FOR A MORE SECURE ENVIRONMENT
Cyber Security Review online –  June 2023


THE 8-STEP COMPREHENSIVE CHECKLIST FOR APPLICATION SECURITY IN 2023
Cyber Security Review online –  April 2023

THE NETWORK SECURITY CHALLENGE:
Improving Visibility to Defend Against Cyberthreats
By Kev Eley, Vice President Sales UK and Europe at LogRhythm

SWEDEN LAUNCHES EUROPE’S MOST ADVANCED HUB FOR AUTOMOTIVE CYBER SECURITY
Research Institute engages ethical hackers and the latest research in cyber technology to combat spiraling threats to connected vehicles  

Resources  |  Contact us  |  Advertise  |  User Login



Copyright © 2026 Cyber Security Review. All Rights Reserved. Privacy Policy
Catch Base by Catch Themes
Scroll Up
  • About
    • Advanced Persistent Threat
    • Artificial Intelligence
    • Critical Infrastructure Protection
      • Aviation
      • Banking and Finance
      • Defence and Aerospace
      • Education and Academia
      • Energy
      • Government
      • Healthcare
      • Industrial Security
      • Telecommunications
      • Transportation
      • Utilities
    • Cybercrime
      • DDoS
    • Malware
    • Network Security
  • News
    • News – March 2026
    • News – February 2026
    • News – January 2026
    • News – December 2025
    • News – November 2025
    • News – October 2025
    • News – September 2025
    • NEWS ARCHIVE
  • Articles
  • Events
  • Editorial
  • Subscribe
  • Advertise