February 04, 2019 Security weaknesses in 5G, 4G and 3G could expose users’ locations Researchers have discovered security holes in 5G, 4G and 3G telephony protocols, which can expose a user's location. Naked Security
November 08, 2016 Who needs a Stingray when Wi-Fi can do the job? Ordinary Wi-Fi hotspots can be used to extract indentifiers from your cellphone, researchers have found Naked Security
December 03, 2015 IRS says it will get warrants before using stingrays The IRS says it's used its stingray to investigate stolen refunds, money laundering, narcotics, attempted murder, murder, and gun trafficking. Naked Security