• Home
  • About
  • Contact
  • Advertising
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Spam
  • Cold War 2
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
  • The Commsrisk Show
Latest
  • 26 Jan 2023 | FCC Threatens to Disconnect Twilio for Illegal Robocalls
  • 25 Jan 2023 | Ericsson Allocates $220mn for More Corruption Penalties
  • 24 Jan 2023 | 73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules
  • 23 Jan 2023 | How Bad Was the New T-Mobile API Data Breach?
  • 20 Jan 2023 | Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement
  • 19 Jan 2023 | Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam
  • 18 Jan 2023 | Scattered Spider: New Cyber Attack Targets Telcos
  • 17 Jan 2023 | Will the US Government Finally Turn Against NSA Warrantless Comms Surveillance?
  • 16 Jan 2023 | 4 Ways Blockchains Will Help Communications Providers to Manage Their Risks
  • 13 Jan 2023 | Thai Police Cut Internet Cables Used by Cambodian Scammers
> 2020 May

More Than 50 Telcos Join the RAG Wangiri Blockchain

By Eric Priezkalns 29 May 2020 Risk, Fraud & Security

International fraud expert Colin Yates has also agreed to provide an independent check of the quality of the wangiri fraud intelligence shared via the blockchain.


Fraud Is Not a Source of Competitive Advantage

By Eric Priezkalns 28 May 2020 Risk, Fraud & Security

Fraud managers who seek superior profits by refusing to share intelligence are wrong about crime, economics and customers. That is why they would never dare say publicly what they admit in private.


5G and Achilles’ Heel: Why Revenue Assurance Must Cover Business Continuity

By Eric Priezkalns 27 May 2020 Assurance & Audit

Network elements will not produce CDRs in a 5G architecture. This will force RA teams to think about what it means to assure revenues.


Wangiri Warnings This Year: Belgium, Costa Rica, Finland, Ireland, Kenya, Lithuania and Poland

By Eric Priezkalns 26 May 2020 Risk, Fraud & Security

There has been no fall in the number of times the public is alerted to spikes in wangiri fraud, but the content of the warnings has evolved.


5 Reasons My Grandpa Would Approve of RAG

By Joseph Nderitu 25 May 2020 Education & Conferences

An old man who taught himself to read also taught lessons of value to a modern professional.


US Threatens to Cut Off Four More Telcos for Spreading COVID-19 Spam

By Eric Priezkalns 22 May 2020 Nuisance & Spam

The FCC and FTC accused telcos in Canada, the UK and USA of either originating or transmitting fraudulent robocalls.


International Bypass Fraud Nearing Extinction

By Kingsley Unah 21 May 2020 Risk, Fraud & Security

The inevitable decline of some revenue streams will kill certain types of fraud, but do not expect the fraudsters to take early retirement.


Fighting Surcharges in Origin Based Pricing

By Timo Vainionpää 20 May 2020 General

The widespread adoption of origin based pricing in Europe is effectively a stealth tax that further encourages customers to switch to OTT services.


Significant Fall in UK Nuisance Calls

By Eric Priezkalns 19 May 2020 Data & Analytics

A survey by the UK regulator found that fewer than half of landline and mobile subscribers had received a nuisance call in the previous four weeks.


2,000 Viewers for Virtual Telecoms Risk Conference

By Eric Priezkalns 18 May 2020 Education & Conferences

Google reports that the Risk & Assurance Group (RAG) received visitors from 470 cities in 93 countries across both days of the RAG Online conference.


1 2 3 »

Latest Stories on Commsrisk

FCC Threatens to Disconnect Twilio for Illegal Robocalls


Ericsson Allocates $220mn for More Corruption Penalties


73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules


How Bad Was the New T-Mobile API Data Breach?



Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement


Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam


Scattered Spider: New Cyber Attack Targets Telcos


Will the US Government Finally Turn Against NSA Warrantless Comms Surveillance?



4 Ways Blockchains Will Help Communications Providers to Manage Their Risks


Thai Police Cut Internet Cables Used by Cambodian Scammers


Elon Musk Says Twitter Lost $60mn a Year Because 390 Telcos Used Bot Accounts to Pump A2P SMS


Surprise UK Government Announcement Says Sharing Netflix Passwords Is a Crime



Commsrisk on Twitter

Tweets from @commsrisk

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ►2023 (19)
    • ►January (19)
  • ►2022 (260)
    • ►December (22)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (22)
    • ►April (21)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2021 (262)
    • ►December (23)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (22)
    • ►July (22)
    • ►June (23)
    • ►May (21)
    • ►April (22)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Leading Contributors
  • Joseph Nderitu
    Joseph Nderitu
  • Michael Lazarou
    Michael Lazarou
  • David Morrow
    David Morrow
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Dan Baker
    Dan Baker
Recent Posts
  • FCC Threatens to Disconnect Twilio for Illegal Robocalls
  • Ericsson Allocates $220mn for More Corruption Penalties
  • 73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules
  • How Bad Was the New T-Mobile API Data Breach?
  • Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement
  • Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam
  • Scattered Spider: New Cyber Attack Targets Telcos
  • Will the US Government Finally Turn Against NSA Warrantless Comms Surveillance?
  • 4 Ways Blockchains Will Help Communications Providers to Manage Their Risks
  • Thai Police Cut Internet Cables Used by Cambodian Scammers
  • Elon Musk Says Twitter Lost $60mn a Year Because 390 Telcos Used Bot Accounts to Pump A2P SMS
  • Surprise UK Government Announcement Says Sharing Netflix Passwords Is a Crime
  • Home
  • About
  • Contact
  • Advertising

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT