The consumer base is on the go, leveraging mobile devices at will to stay connected and within reach of rich data and powerful applications at all times. While this is great for the user, it’s a complex challenge for the service provider trying to maintain quality service deliverables for a growing subscriber base.


This challenge is driving the need for small cells throughout mobile networks everywhere. The deployment of small cells helps to extend coverage of the wireless network and its being readily adopted to ensure survival.

What these service providers may have missed, however, is a major security hole. Also known as femtocells, these small cells also offer opportunities for eavesdropping. iSEC Partners recently released the findings from their research that suggests a security hole exists within this technology. In fact, in a demonstration for CNNMoney, the firm used the hole to record a phone conversation and play it back for staff members.

The phone conversation wasn’t the only content at risk. iSEC Partners was also able to record browsing history, text messages and pictures sent from one smartphone to another. Their main point of access was a hack through the network extender. Basically, they were able to see anything and everything a mobile phone would send to a cell tower.

The security flaw was originally discovered by iSEC Partners a year ago. The firm contacted the affected vendors so they could begin working on a fix. The important point is for these network operators to examine their current networks and make changes were necessary.

This finding points to an important lesson in the adoption of next generation technologies. The consumer accustomed to the reliability and security afforded in the traditional landline may not pay attention to the risks associated with mobile connections. If that consumer also uses their smartphone for work-related interactions, the risk is higher. Information shared to and from the corporate network is instantly at risk.

It truly is up to the vendors implementing small cells to ensure the proper security is in place to protect users. Do your due diligence and ensure what you do on the go matches with your own personal or your corporate policies, but also demand the same from your provider. Anything less just puts your communications at risk.




Edited by Stefania Viscusi