New Technologies, New Threats?
Thanks for coming back for the second installment in our series of blog posts on securing the haul. If you missed our first post, Spider-Man, Uncle Ben & cellular networks, just click here to view it.
• Eavesdropping – Compromising the confidentiality of user data traffic or call-related information
• Subscription fraud – Exploiting services with heavy usage with no intention to pay for them
Topics: Cyber Security