PinnedPublished inInfoSec Write-upsHow Mobile Operators Lost Thousands of Dollars because of SMS Malware.SMS Malware Analysis — Write Up By Josue MartinsApr 18, 2022Apr 18, 2022
PinnedPublished inInfoSec Write-upsMobile Malware Analysis - Writeup By Josue MartinsMALWARE FILE INFORMATIONFeb 29, 2020Feb 29, 2020
PinnedPublished inJosue Martins In Cyber SecurityEmbedded Mobile Malware — The greatest cyber weaponThe cybersecurity and enterprise have deep knowledge of attacks towards computers and servers running Linux or windows but not towards…Dec 2, 2020Dec 2, 2020
PinnedPublished inJosue Martins In Cyber SecurityiOS versus Android — Qual sistema operativo que é mais suscetível a infecções de vírus?Quando fala-se de virus moveis muita gente ainda pensa que é um mito e que esses tipos de virus não existem, mas eles virus são muitos…Jul 2, 2020Jul 2, 2020
PinnedPublished inJosue Martins In Cyber SecurityDetecting Wangiri/Single Ring Solicitation Calls in ISUP TrafficWhat is Single Ring Solicitation Fraud (Wangiri Fraud)?Mar 25, 2020Mar 25, 2020
Published inJosue Martins In Cyber SecurityFour Potential Cyber Security Attacks On Tesla CybercabsThe Tesla Cybercab, a fully autonomous electric vehicle, which represents a significant advancement in transportation technology and…Oct 12Oct 12
Published inJosue Martins In Cyber SecurityOvercoming the Cybersecurity Professional’s Five Fatal FlawsGrowing and Learning in CybersecuritySep 16Sep 16
Published inJosue Martins In Cyber SecurityDid CrowdStrike Customers Implement Business Continuity & Disaster Recovery?Failing at Business continuity(BC) and Disaster recovery(DR) programJul 23Jul 23
Published inJosue Martins In Cyber Security2G To 5G Core Networks, The Legacy Signaling Protocols That Should be AvoidedSignaling security by design and reducing the attack surfaceJul 19Jul 19
Published inJosue Martins In Cyber Security5G SA Roaming Without OAuth 2.0 Equals Insecurity By Design.Insecurity By Design Or Insecurity By Ignorance?Apr 9Apr 9