SIM Card (in)Security and IoT
Researcher Karsten Nohl presented different ways to hack SIM cards and the measures that needed to be taken to bridge that security gap. Snowden’s leaked files portrayed SIM card vulnerabilities. Gemalto’s hack seemed predetermined by secret intelligence agencies. Despite the security threats, however, the SIM card must be able to adapt and survive for the foreseeable future. Assuming that cybersecurity threats concerning SIMs can be mitigated or at least contained the SIM will play a crucial role in the upcoming IoT ecosystem.
To find out more about subscribing:
- Next-Generation Physical Access Control Technologies and Opportunities
- Why Operators Should Reposition as “eSIM Companies”
- TfL Figures Demonstrate the Mobile Potential
- FPC Brings China’s First Biometric Contactless Payment Card: What Does the Future Hold?
- What is The True Cost of Rectifying a Security Flaw/Breach?