What is the difference between P2P SMS and A2P SMS?

Posted Monday, June 20th, 2016 by Babak Saadatmandi

When an SMS message exchanges between two mobile subscribers (two SIM cards) we call it P2P SMS (Person-to-Person SMS) and when an SMS message sends from an application to a mobile subscriber we call it A2P SMS (Application-to-Person SMS). A2P […]

Read more...


SS7 Vulnerabilities – Mobile Network Security in the mainstream News

Posted Thursday, May 12th, 2016 by Babak Saadatmandi

“I bumped into you in the hallway – I don’t know if you noticed that…? In that time, I pushed a credential across to your phone – which means my bluetooth is now trusted by your phone…” …the All Stars of […]

Read more...


Major security flaw in SS7 – how SMS Home Routing can plug the gap

Posted Monday, April 25th, 2016 by Tony Murphy

With the current buzz regarding SS7 network vulnerabilities and the exploitation of standard SMS methodologies to obtain confidential subscriber information I thought it would be interesting to discuss the 3GPP document “TR 23.840, V7.1.0 (2007-03)”.  This document written in 2006 […]

Read more...


Subscriber Identity Disclosure: How an attacker can obtain IMSI of a subscriber?

Posted Saturday, March 19th, 2016 by Tony Murphy

Since the “Subscriber Identity Disclosure” uses a portion of the Short Message Service (SMS) capability a brief explanation of SMS call flow is in order. When a subscriber sends an SMS Message it is transported over the air interface to […]

Read more...


Operator A2P SMS – it’s all about strategy (and some technology)

Posted Friday, March 4th, 2016 by Ian Waller

Let’s get one fact straight, A2P SMS is by far the most preferred and efficient B2C communication tool used today. When I write this I mean THE VERY MOST EFFICIENT way of communication. So why is that? Here are some […]

Read more...