• Home
  • About
  • Contact
  • Sitemap
  • RSS
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
Latest
  • 19 Apr 2021 | Only 1 in 5 Mobile Operators Believe GSMA/3GPP Security Guidelines Cover All Signaling Threats
  • 16 Apr 2021 | RAG Learning Celebrates Third Birthday and Offers New Course on Roaming SMS Fraud
  • 15 Apr 2021 | Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody
  • 14 Apr 2021 | Last Chance to Benchmark Your Leakage Coverage
  • 13 Apr 2021 | A Brief Guide to the Digital Divide
  • 12 Apr 2021 | Canada Postpones STIR/SHAKEN Deadline Yet Again
  • 9 Apr 2021 | Mobile Money APIs, Society and Risk
  • 8 Apr 2021 | Fake Cryptocurrency Wallets Found on Google and Apple App Stores
  • 7 Apr 2021 | UK Regulator Hints at Considering STIR/SHAKEN
  • 6 Apr 2021 | Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December
> 2014 August

Mara-Ison Connectiva Rebrands; Shifts Focus to Analytics

By Eric Priezkalns 25 Aug 2014 Data & Analytics

The vendor formerly known as Mara-Ison Connectiva has changed its official name to Connectiva Insights and Analytics Ltd, and has adopted the new (but very…


SOCs, ROCs & NOCs: Unforeseen challenges as security and assurance converge

By Eric Priezkalns 18 Aug 2014 Risk, Fraud & Security

Does your telco have a SOC? That was the most fundamental question raised during the pre-conference training workshop at the WeDo WWUG14 user event, earlier…


The Curious Case of the Vanishing Targets

By Eric Priezkalns 11 Aug 2014 Assurance & Audit

I have a very serious point to make today. But in order to make it, I will start with a comic daydream… Usain Bolt struck…


Basset Acquired for $10mn

By Eric Priezkalns 6 Aug 2014 Data & Analytics

Basset, the Swedish revenue management software firm, has been purchased by Enghouse Systems for USD10mn. You can see the press release here. Though their strengths…


Why People and Tools are a Complementary Combination

By Guest 4 Aug 2014 Assurance & Audit

Today’s guest post is by Ahmad Nadeem Syed, Director of Revenue Assurance and Fraud Management at Mobilink. When long-standing talkRA contributor David Leshem argued why…


Top Stories on Commsrisk

Only 1 in 5 Mobile Operators Believe GSMA/3GPP Security Guidelines Cover All Signaling Threats


RAG Learning Celebrates Third Birthday and Offers New Course on Roaming SMS Fraud


Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody


Last Chance to Benchmark Your Leakage Coverage



A Brief Guide to the Digital Divide


Canada Postpones STIR/SHAKEN Deadline Yet Again


Mobile Money APIs, Society and Risk


Fake Cryptocurrency Wallets Found on Google and Apple App Stores



RAG TV Season 3

Commsrisk Editor Eric Priezkalns is back presenting a new season of RAG TV! Watch the replays if you miss the live show. Here is the season opener, where Eric and co-presenter Lee Scargall reviewed the events of 2020.

 

Recent Comments

  • Nadejda Papernaia Nadejda Papernaia 1 Apr 2021
    Stop Simbox Fraud in Your Network with AB Handshake
    Hi Tomislav. Thank you very much for questions. You wrote: Even though the handshake will be received, what is going to happen? Will you be disconnecting the calls or you will inform your roaming partner to disconnect the SIM card? The answer is following: the system detects in...
  • Tomislav Bučkal Tomislav Bučkal 31 Mar 2021
    Stop Simbox Fraud in Your Network with AB Handshake
    Hi, from my standpoint, the root cause is why 3rd party is receiving traffic. Even though the handshake will be received, what is going to happen? Will you be disconnecting the calls or you will inform your roaming partner to disconnect the SIM card? If let's say 2% of traffic...

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ▼2021 (77)
    • ▼April (13)
      • Only 1 in 5 Mobile Operators Believe GSMA/3GPP Security Guidelines Cover All Signaling Threats
      • RAG Learning Celebrates Third Birthday and Offers New Course on Roaming SMS Fraud
      • Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody
      • Last Chance to Benchmark Your Leakage Coverage
      • A Brief Guide to the Digital Divide
      • Canada Postpones STIR/SHAKEN Deadline Yet Again
      • Mobile Money APIs, Society and Risk
      • Fake Cryptocurrency Wallets Found on Google and Apple App Stores
      • UK Regulator Hints at Considering STIR/SHAKEN
      • Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December
      • Commsrisk Top Ten for March 2021
      • RAG TV: The Scale of A2P SMS Bypass Fraud
      • Leakage Coverage Study Extended to April 14
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Writers
  • Joseph Nderitu
    Joseph Nderitu
  • Rob Chapman
    Rob Chapman
  • Michael Lazarou
    Michael Lazarou
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Mike Willett
    Mike Willett
  • Dan Baker
    Dan Baker
  • David Morrow
    David Morrow
  • Ashwin Menon
    Ashwin Menon
  • Luke Taylor
    Luke Taylor
  • Daniel Peter
    Daniel Peter
  • Carlos Marques
    Carlos Marques
Recent Posts
  • Only 1 in 5 Mobile Operators Believe GSMA/3GPP Security Guidelines Cover All Signaling Threats
  • RAG Learning Celebrates Third Birthday and Offers New Course on Roaming SMS Fraud
  • Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody
  • Last Chance to Benchmark Your Leakage Coverage
  • A Brief Guide to the Digital Divide
  • Canada Postpones STIR/SHAKEN Deadline Yet Again
  • Mobile Money APIs, Society and Risk
  • Fake Cryptocurrency Wallets Found on Google and Apple App Stores
  • UK Regulator Hints at Considering STIR/SHAKEN
  • Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December
  • Commsrisk Top Ten for March 2021
  • RAG TV: The Scale of A2P SMS Bypass Fraud
  • Leakage Coverage Study Extended to April 14
  • Should Undersea Cables Be Defended as Military Targets?
  • Stop Simbox Fraud in Your Network with AB Handshake
  • Has the NetNumber SMS Hijack Vulnerability Been Fixed Already?
  • Police Fight a Losing Battle Against Encrypted Comms
  • Should Other Countries Copy the US Approach to Fraud and Spoofing?
  • Google Cloud Can Now Let Your Insurers Know How Secure You Really Are
  • Police Take Down Pirate Streaming App with 100mn Users
  • Disturbing New SMS Hijack Blamed on NetNumber IDs
  • Huawei and Other Chinese Suppliers Deemed Unacceptable Risk by US Comms Regulator
  • Why Are 74% of Operators Still Vulnerable to Signaling Attacks?
  • $583mn of A2P SMS Bypass Fraud during 2020 per Araxxe Tests
  • Why India Had to Suspend SMS Spam Blockchain Safelist
  • Home
  • About
  • Contact
  • Sitemap
  • RSS

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.