How to Respond to OTT Bypass
OTT bypass takes voice calls on a detour, terminating them via an app on the receiving user’s phone. Revector is developing the technology and legal strategy to mitigate this emerging risk.
OTT bypass takes voice calls on a detour, terminating them via an app on the receiving user’s phone. Revector is developing the technology and legal strategy to mitigate this emerging risk.
Underwriters Laboratories (UL), pioneers of safety certification for electrical goods, aim to deliver a safety and security framework for wearables by the end of the year.
The offices of Vodafone Ghana were threatened with closure after a ‘miscommunication’ with the Ministry of Finance.
Nearly USD600m will be spent on anti-fraud tools and services during 2015, but the analysis shows new technology is helping some frauds to rise whilst causing others to fall.
Our industry needs to think seriously about how we maintain the integrity of email addresses, if we want to keep using them as a key that opens access to other online services.
OTT bypass is hybrid of legal ‘over the top’ comms with illegal bypass fraud. Falling into a legally grey area, it poses a significant and rising threat to network operators.
When it comes to serving customers, new disruptive businesses show how far older organizations lag behind. Telcos need to respond – but will they be able to?
Hewlett-Packard’s research into IoT security includes a new study that criticizes networked smartwatches.
Yet another market research report includes some extraordinary errors, such as describing a business as a ‘prominent vendor’ even though it collapsed years ago.
When Apple introduced a “kill switch” that disabled stolen iPhones, there was a fall in crime in some cities, but not all.