Main Threats

Major threats that Mobile Crypto can handle & avoid:

  • Any remote and local Spy Phones software

  • Remote interception by: Active GSM (A51 and A52 Decipher)

  • Remote interception by: Passive GSM (A51 and A52 Decipher)

  • Remote interception by : Active 3G and 4G interception 

  • Interception at the Cellular Operator based on 3G and 2G

  • Wi-Fi interception that can crack WEP and WPK2

  • Remote Email interception

  • Remote microphone interception

  • Remote browser interception

  • Remote fake apps installation or update

  • Prevent SS7 manipulation – including Mobile location
    via Mobile Operators via HLR

  • Prevent any attack – On regular VOIP Desktop Phones

  • Prevent any leak of information via “ Usb Cable “
    that can be connected to any PC

1/4