• Home
  • About
  • Contact
  • Advertising
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Spam
  • Cold War 2
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
  • The Commsrisk Show
Latest
  • 2 Jun 2023 | Commsrisk Top Ten for May 2023
  • 1 Jun 2023 | Robocalls and Call Authentication: Commsrisk Show Episode 12
  • 31 May 2023 | Will the Big New US Robocall Lawsuit Change Anything?
  • 30 May 2023 | ENISA Publishes 5G Security Controls Matrix
  • 29 May 2023 | Arguments in Brazil about STIR/SHAKEN
  • 26 May 2023 | Will AI-Powered Spam Filters Be Forced on Indian Telcos?
  • 25 May 2023 | Nation State Hacking, Pre-Installed Malware, Prison for Spoofer and Job Cuts: Commsrisk Show Episode 11
  • 24 May 2023 | Free Guide for Telco KYC
  • 23 May 2023 | French President Macron Promises National Scam Block for SMS and Email
  • 22 May 2023 | 13 Years in Prison for Head of London Phone Spoofing Fraud Outfit
> 2015

Blink and You’ll Miss a Revolution

By Carlos Marques 31 Dec 2015 Risk, Fraud & Security

Author Malcolm Gladwell has written about people suffering information overload. However, machines thrive on data. That is why fraudsters should be identified by computer algorithms.


PayPal CRO Says Fraud Will Go Mobile in 2016

By Eric Priezkalns 30 Dec 2015 Risk, Fraud & Security

The Chief Risk Officer of PayPal warns that fraudsters will increasingly target the users of mobile phones.


Site for Sore Eyes: Economics of Domain Names

By IPKat 29 Dec 2015 Privacy & Intellectual Property

An amusing insight into why the importance and value of domain names may be falling for everyone except those with the biggest internet brands.


The Commsrisk Review of 2015

By Eric Priezkalns 28 Dec 2015 General

The major events of 2015 showed why it is so difficult for risk and assurance professionals to adapt to business and technology change, but also why they must.


The Codebreaker’s Christmas Puzzle

By Eric Priezkalns 25 Dec 2015 Quiz Questions, Quizzes

Wannabe spies will enjoy GCHQ’s cryptographic twist on seasonal greetings.


Data Gathering by Roaming Around

By Joseph Nderitu 24 Dec 2015 Assurance & Audit

A humorous look at how we gather information, asking us to step away from our dashboards, analytics and in-trays, and devote time to real conversation.


When Is Credit Risk Too Restrictive?

By Luke Taylor 23 Dec 2015 Risk, Fraud & Security

Telcos have a lot of data which is not being effectively used when assessing the credit risk of individual customers.


Euro Commission Issues Copyright Proposals

By Eric Priezkalns 22 Dec 2015 Privacy & Intellectual Property

The Commission has put forward concrete proposals to counter geoblocking, but is still pondering variations on the ‘link tax’.


The Test Call Generator in Your Pocket

By Eric Priezkalns 21 Dec 2015 Assurance & Audit

Why do telcos buy specialized test call generators when they could just use standard consumer-grade phones? And how can a standard phone be used to detect OTT bypass?


IEEE “Intro to Cloud Computing” Training Review

By Michael Lazarou 18 Dec 2015 Education & Conferences

This online edX course from the Institute of Electrical and Electronics Engineers will suit anyone contemplating the suitability of cloud solutions for their business.


1 2 3 … 24 »

Replay Our Discussion Show from May 31

Our weekly Wednesday livestreams feature Commsrisk Editor Eric Priezkalns and his co-presenters engaging in conversation with risk experts from around the communications industry. Catch recordings of all past episodes at tv.commsrisk.com.
Our most recent episode tackled the thorny issue of nuisance robocalls and call authentication from several different perspectives. The guests were robocall researcher Sathik Prasad, network engineering veteran Pierce Gorman and Feng Hao, Professor of Security Engineering at Warwick University.

Latest Stories on Commsrisk

Commsrisk Top Ten for May 2023


Robocalls and Call Authentication: Commsrisk Show Episode 12


Will the Big New US Robocall Lawsuit Change Anything?


ENISA Publishes 5G Security Controls Matrix



Commsrisk on Twitter

Tweets from @commsrisk

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ►2023 (110)
    • ►June (2)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2022 (260)
    • ►December (22)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (22)
    • ►April (21)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2021 (262)
    • ►December (23)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (22)
    • ►July (22)
    • ►June (23)
    • ►May (21)
    • ►April (22)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Leading Contributors
  • Joseph Nderitu
    Joseph Nderitu
  • Michael Lazarou
    Michael Lazarou
  • David Morrow
    David Morrow
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Mike Willett
    Mike Willett
Recent Posts
  • Commsrisk Top Ten for May 2023
  • Robocalls and Call Authentication: Commsrisk Show Episode 12
  • Will the Big New US Robocall Lawsuit Change Anything?
  • ENISA Publishes 5G Security Controls Matrix
  • Arguments in Brazil about STIR/SHAKEN
  • Will AI-Powered Spam Filters Be Forced on Indian Telcos?
  • Nation State Hacking, Pre-Installed Malware, Prison for Spoofer and Job Cuts: Commsrisk Show Episode 11
  • Free Guide for Telco KYC
  • French President Macron Promises National Scam Block for SMS and Email
  • 13 Years in Prison for Head of London Phone Spoofing Fraud Outfit
  • Artificially Inflated Traffic from Bots Makes Spotify Remove Thousands of AI-Generated Songs
  • Karsten Nohl on Cloud Hacking, Central Bank Ends SMS 2FA and Macron’s Filter: Commsrisk Show Episode 10
  • Home
  • About
  • Contact
  • Advertising

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT