Skip to content

Commit 0a04048

Browse files
author
Your Name
committed
ff
1 parent c329bce commit 0a04048

15 files changed

+71
-149
lines changed

about.html

Lines changed: 34 additions & 111 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
<head>
44
<meta charset="UTF-8">
55
<meta name="viewport" content="width=device-width, initial-scale=1.0">
6-
<title>About - Telecom Security Documents</title>
7-
<meta name="description" content="Learn about our mission to provide comprehensive telecommunications security documentation and resources for security professionals, researchers, and industry experts.">
6+
<title>About - Telecom Security Documents by RFS</title>
7+
<meta name="description" content="Learn about RFS, a specialized telecommunications security researcher, and their comprehensive collection of security documentation and resources for security professionals, researchers, and industry experts.">
88

99
<!-- AdSense -->
1010
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-9236847887178276" crossorigin="anonymous"></script>
@@ -20,7 +20,7 @@
2020
<div class="container">
2121
<a class="navbar-brand" href="index.html">
2222
<i class="fas fa-shield-alt me-2"></i>
23-
Telecom Security
23+
Telecom Security Documents
2424
</a>
2525
<button class="navbar-toggler" type="button" data-bs-toggle="collapse" data-bs-target="#navbarNav">
2626
<span class="navbar-toggler-icon"></span>
@@ -51,10 +51,10 @@
5151
<div class="col-lg-8 mx-auto text-center">
5252
<h1 class="display-3 fw-bold text-white mb-4">
5353
<i class="fas fa-users me-3"></i>
54-
About Our Mission
54+
About RFS
5555
</h1>
5656
<p class="lead text-white-50 mb-4">
57-
Empowering security professionals, researchers, and industry experts with comprehensive telecommunications security knowledge and resources
57+
RFS is a specialized telecommunications security researcher dedicated to advancing the field of mobile network security through comprehensive documentation and analysis
5858
</p>
5959
<div class="hero-stats">
6060
<div class="row text-center">
@@ -144,112 +144,35 @@ <h4>Industry Collaboration</h4>
144144
<!-- Team Section -->
145145
<section class="team-section py-5 bg-light">
146146
<div class="container">
147-
<h2 class="section-title text-center mb-5">Our Team</h2>
148-
<div class="row g-4">
149-
<div class="col-lg-4 col-md-6">
150-
<div class="team-card">
151-
<div class="team-avatar">
152-
<i class="fas fa-user-circle"></i>
153-
</div>
154-
<div class="team-info">
155-
<h4>Dr. Sarah Chen</h4>
156-
<p class="team-role">Lead Security Researcher</p>
157-
<p class="team-affiliation">Stanford University</p>
158-
<p class="team-bio">Expert in 4G/5G network security with over 15 years of experience in telecommunications security research.</p>
159-
<div class="team-expertise">
160-
<span class="badge bg-primary">4G Security</span>
161-
<span class="badge bg-primary">5G Security</span>
162-
<span class="badge bg-primary">Network Architecture</span>
163-
</div>
164-
</div>
165-
</div>
166-
</div>
167-
<div class="col-lg-4 col-md-6">
168-
<div class="team-card">
169-
<div class="team-avatar">
170-
<i class="fas fa-user-circle"></i>
171-
</div>
172-
<div class="team-info">
173-
<h4>Dr. Michael Rodriguez</h4>
174-
<p class="team-role">Protocol Security Specialist</p>
175-
<p class="team-affiliation">MIT Computer Science</p>
176-
<p class="team-bio">Specialist in SS7 and signaling protocol security with extensive experience in telecom fraud detection.</p>
177-
<div class="team-expertise">
178-
<span class="badge bg-success">SS7 Security</span>
179-
<span class="badge bg-success">Protocol Analysis</span>
180-
<span class="badge bg-success">Fraud Detection</span>
181-
</div>
182-
</div>
183-
</div>
184-
</div>
185-
<div class="col-lg-4 col-md-6">
186-
<div class="team-card">
187-
<div class="team-avatar">
188-
<i class="fas fa-user-circle"></i>
189-
</div>
190-
<div class="team-info">
191-
<h4>Dr. Emily Wang</h4>
192-
<p class="team-role">Hardware Security Expert</p>
193-
<p class="team-affiliation">Carnegie Mellon University</p>
194-
<p class="team-bio">Expert in SIM card security, baseband processor vulnerabilities, and hardware attack vectors.</p>
195-
<div class="team-expertise">
196-
<span class="badge bg-warning">SIM Security</span>
197-
<span class="badge bg-warning">Hardware Attacks</span>
198-
<span class="badge bg-warning">Baseband Security</span>
199-
</div>
200-
</div>
201-
</div>
202-
</div>
203-
<div class="col-lg-4 col-md-6">
204-
<div class="team-card">
205-
<div class="team-avatar">
206-
<i class="fas fa-user-circle"></i>
207-
</div>
208-
<div class="team-info">
209-
<h4>Dr. James Wilson</h4>
210-
<p class="team-role">Threat Intelligence Lead</p>
211-
<p class="team-affiliation">GSMA Security</p>
212-
<p class="team-bio">Leading threat intelligence initiatives and developing security frameworks for mobile networks.</p>
213-
<div class="team-expertise">
214-
<span class="badge bg-info">Threat Intelligence</span>
215-
<span class="badge bg-info">MoTIF Framework</span>
216-
<span class="badge bg-info">Mobile Security</span>
217-
</div>
218-
</div>
219-
</div>
220-
</div>
221-
<div class="col-lg-4 col-md-6">
222-
<div class="team-card">
223-
<div class="team-avatar">
224-
<i class="fas fa-user-circle"></i>
225-
</div>
226-
<div class="team-info">
227-
<h4>Dr. Lisa Thompson</h4>
228-
<p class="team-role">IoT Security Specialist</p>
229-
<p class="team-affiliation">NIST Cybersecurity</p>
230-
<p class="team-bio">Specialist in IoT security challenges and 5G network slicing security implementation.</p>
231-
<div class="team-expertise">
232-
<span class="badge bg-secondary">IoT Security</span>
233-
<span class="badge bg-secondary">Network Slicing</span>
234-
<span class="badge bg-secondary">5G Security</span>
235-
</div>
236-
</div>
237-
</div>
147+
<div class="row">
148+
<div class="col-lg-8 mx-auto text-center">
149+
<h2 class="section-title mb-4">RFS Team</h2>
150+
<p class="lead text-muted mb-5">
151+
RFS is a specialized telecommunications security researcher with expertise across all aspects of mobile network security, from 2G to 5G networks, protocol analysis, hardware security, and threat intelligence.
152+
</p>
238153
</div>
239-
<div class="col-lg-4 col-md-6">
240-
<div class="team-card">
241-
<div class="team-avatar">
242-
<i class="fas fa-user-circle"></i>
154+
</div>
155+
<div class="row">
156+
<div class="col-lg-8 mx-auto">
157+
<div class="team-card text-center">
158+
<div class="team-avatar mb-4">
159+
<i class="fas fa-shield-alt fa-4x text-primary"></i>
243160
</div>
244161
<div class="team-info">
245-
<h4>Dr. Carlos Rodriguez</h4>
246-
<p class="team-role">Infrastructure Security</p>
247-
<p class="team-affiliation">Mobile Security Labs</p>
248-
<p class="team-bio">Expert in base station security, GPON networks, and physical infrastructure protection.</p>
249-
<div class="team-expertise">
250-
<span class="badge bg-dark">Base Stations</span>
251-
<span class="badge bg-dark">GPON Security</span>
252-
<span class="badge bg-dark">Infrastructure</span>
162+
<h3>RFS</h3>
163+
<p class="team-role">Telecommunications Security Researcher</p>
164+
<p class="team-bio">
165+
RFS specializes in telecommunications security research, covering 2G, 3G, 4G, and 5G networks,
166+
SS7/Diameter protocols, SIM card security, baseband vulnerabilities, and emerging threats in mobile infrastructure.
167+
Focus on practical security analysis, threat assessment, and providing actionable insights for the telecom industry.
168+
</p>
169+
<div class="team-expertise mt-4">
170+
<span class="badge bg-primary me-2">2G/3G/4G/5G Security</span>
171+
<span class="badge bg-success me-2">Protocol Analysis</span>
172+
<span class="badge bg-warning me-2">Hardware Security</span>
173+
<span class="badge bg-info me-2">Threat Intelligence</span>
174+
<span class="badge bg-secondary me-2">Network Infrastructure</span>
175+
<span class="badge bg-dark me-2">Fraud Detection</span>
253176
</div>
254177
</div>
255178
</div>
@@ -345,8 +268,8 @@ <h5>LinkedIn</h5>
345268
<div class="container">
346269
<div class="row">
347270
<div class="col-lg-4 mb-4">
348-
<h5><i class="fas fa-shield-alt me-2"></i>Telecom Security</h5>
349-
<p class="text-muted">Comprehensive collection of telecommunications security documentation, research papers, and resources for security professionals, researchers, and industry experts.</p>
271+
<h5><i class="fas fa-shield-alt me-2"></i>Telecom Security Documents</h5>
272+
<p class="text-muted">Comprehensive collection of telecommunications security documentation, research papers, and resources by RFS for security professionals, researchers, and industry experts.</p>
350273
<div class="social-links">
351274
<a href="#" class="text-muted me-3"><i class="fab fa-twitter fa-lg"></i></a>
352275
<a href="#" class="text-muted me-3"><i class="fab fa-linkedin fa-lg"></i></a>
@@ -383,7 +306,7 @@ <h6>Newsletter</h6>
383306
<hr class="my-4">
384307
<div class="row align-items-center">
385308
<div class="col-md-6">
386-
<p class="mb-0 text-muted">&copy; 2024 Telecom Security. All rights reserved.</p>
309+
<p class="mb-0 text-muted">&copy; 2024 Telecom Security Documents. All rights reserved. | Research by RFS</p>
387310
</div>
388311
<div class="col-md-6 text-md-end">
389312
<a href="#" class="text-muted me-3">Privacy Policy</a>
1.27 MB
Loading
1.27 MB
Loading
1.27 MB
Loading

images/RFS.jpg

165 KB
Loading

images/Telecom-Monitoring.jpg

251 KB
Loading

images/hero.jpeg

220 KB
Loading

images/rfs.png

27.6 KB
Loading

images/ss7-attack-vectors.png

1.14 MB
Loading

images/telcosec-hero-main.png

151 KB
Loading

0 commit comments

Comments
 (0)