The Fulcrum Platform delivers trusted, special-purpose services through a secure system architecture
A fake cell tower that can be used to capture cellular data from a connected smartphone.
The practice of stealthily gathering data about a target via their smartphone.
The practice of observing a smartphone user’s locations and movements.
A type of smartphone attack over a wireless protocol that forces a smartphone to connect to untrusted equipment.
A type of smartphone malware that is secretly installed on a targeted device to silently observe and gather information.
A type of attack that gives the operator the ability to install spyware on a smartphone without any interaction with the target.
Term | Definition | Example |
---|---|---|
Vulnerability | A security weakness within a system that can be leveraged by a threat actor | A threat actor discovers a usable flaw in a popular messaging app |
Exploit | The means – typically a piece of code – through which a vulnerability can be leveraged for malicious activity | The threat actor writes exploit code for the discovered vulnerability |
Threat | The possibility that a system can be compromised by a threat actor’s activities or methods, often involving one or more exploits | With the vulnerability not yet patched by the vendor, a potential target is under threat that their smartphone can be used for spying |
Risk | The potential for loss, damage or destruction of assets or data as a result of a threat, determined by the severity of impact and the likelihood of occurrence | The potential target experiences an increase in the risk that their sensitive information will be discovered |
Attack | The realization of a threat via an active offensive action by a threat actor | The threat actor performs a zero-click attack to stealthily install spyware on the smartphone of a target |
FOLLOW US