INDEX

SIM Card (in)Security and IoT

by Dimitrios Pavlakis | 2Q 2015 | IN-3632

Researcher Karsten Nohl presented different ways to hack SIM cards and the measures that needed to be taken to bridge that security gap. Snowden’s leaked files portrayed SIM card vulnerabilities. Gemalto’s hack seemed predetermined by secret intelligence agencies. Despite the security threats, however, the SIM card must be able to adapt and survive for the foreseeable future. Assuming that cybersecurity threats concerning SIMs can be mitigated or at least contained the SIM will play a crucial role in the upcoming IoT ecosystem.

You must be a subscriber to view this Insight.

To find out more about subscribing:
Contact a representative about purchasing options.