Countering SIM-Swapping
In this study, we give an overview of how SIM-Swapping attacks work, list measures that providers can take to mitigate the attack and make recommendations for policy makers and authorities in the telecom sector and other sectors. Security of…
How to Avoid SIM-Swapping - Leaflet
This leaflet, addresses the SIM-swapping attacks, how to recognise them and how to mitigate the risk connected to this fraud. In fact, subscriber Identity Module (SIM) swapping is a legitimate procedure performed by a customer to change their SIM…
Embedded Sim Ecosystem, Security Risks and Measures
eSIM is the generic term used for the embedded form of a SIM (subscriber identity module) card. Built into the device, the eSIM is hosted on a tiny chip that provide storage for the mobile subscription details in digital format.
Like the regular…
ENISA CSIRT maturity assessment model
This is the updated version of the "Challenges for National CSIRTs in Europe in 2016: Study on CSIRT Maturity" published by ENISA in 2017. The study takes all relevant information sources into account, with a special emphasis on the NIS Directive,…
Beware of the Sim Swapping Fraud!
How do Sim Swapping attacks work and what can you do to protect yourself? Learn it all in the new technical deep dive by the European Union Agency for Cybersecurity.
Unveiling the Telecom Cybersecurity Challenges
The European Union Agency for Cybersecurity (ENISA) publishes one report on eSIMs and a second one on fog and edge computing in 5G. Both reports intend to provide insights on the challenges of these technologies.
CSIRTs Maturity: Moving to the Next Level
The European Union Agency for Cybersecurity issues a new version of the CSIRT maturity framework to improve national CSIRTs capacity.
Securing the Seas and the Skies
The 3rd ENISA Telecom & Digital Infrastructure Security Forum organised today addressed emerging technologies and the evolving threat landscape including challenges from sub-sea cables to satellites.
Pagination