• Home
  • About
  • Contact
  • Sitemap
  • RSS
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
Latest
  • 15 Apr 2021 | Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody
  • 14 Apr 2021 | Last Chance to Benchmark Your Leakage Coverage
  • 13 Apr 2021 | A Brief Guide to the Digital Divide
  • 12 Apr 2021 | Canada Postpones STIR/SHAKEN Deadline Yet Again
  • 9 Apr 2021 | Mobile Money APIs, Society and Risk
  • 8 Apr 2021 | Fake Cryptocurrency Wallets Found on Google and Apple App Stores
  • 7 Apr 2021 | UK Regulator Hints at Considering STIR/SHAKEN
  • 6 Apr 2021 | Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December
  • 5 Apr 2021 | Commsrisk Top Ten for March 2021
  • 2 Apr 2021 | RAG TV: The Scale of A2P SMS Bypass Fraud
> 2021 January

Protecting Online Identities in a Chaotic World

By Eric Priezkalns 29 Jan 2021 Privacy & Intellectual Property

Author and analyst Edward Finegold discussed the evolving challenges surrounding digital identities and the revenues they generate for episode 4 of the current season of RAG TV.


Are SIM Swaps Rising? Freedom of Information Disclosure Shows UK Police Figures Are Unreliable

By Eric Priezkalns 28 Jan 2021 Data & Analytics

UK newspapers said SIM swaps were up 400% since 2015. Dig into police data and you realize how little truth supports that claim.


Overcoming the Risk Professionals Who Resist Change

By Eric Priezkalns 27 Jan 2021 General

Racism, sexism, a lack of respect and professional inertia all persist because of a collective timidity when faced by obstructionists.


AB Handshake Is SWIFT for Telecoms

By Nadejda Papernaia 26 Jan 2021 Risk, Fraud & Security

In the 1970’s bankers worked out how to use secure messaging to prevent any discrepancies when making international transfers. The same method would work for international calls.


Why Are Fair Usage Policies So Inconsistent?

By Kerry Evans 25 Jan 2021 Risk, Fraud & Security

There is a lot of overlap between behavior indicative of fraud and behavior that should be stopped by a fair usage policy.


The Assassin That Was Tricked by a Spoofed CLI

By Eric Priezkalns 22 Jan 2021 General

Russian politician Alexei Navalny wanted to know how he was poisoned using the deadly Novichok nerve agent, so he simply called one of the team responsible.


Leadership for Africans (and Everyone Else)

By Eric Priezkalns 21 Jan 2021 Education & Conferences

Some thoughts about the difference between being more advanced and being a leader.


World’s Largest Dark Web Market Taken Down

By Eric Priezkalns 20 Jan 2021 Risk, Fraud & Security

DarkMarket was said to have enabled USD140mn of transactions between 2,400 vendors and almost 500,000 users.


Racist Robocaller Fined $9.9mn

By Eric Priezkalns 19 Jan 2021 Privacy & Intellectual Property

American neo-Nazi Scott Rhodes spoofed the CLIs of 4,959 calls that promoted his website and beliefs.


RAG and GSMA FASG Top Poll of Respected RAFM Collaborations; GRAPA and CFCA at Bottom

By Eric Priezkalns 18 Jan 2021 Data & Analytics

Our poll asked respondents to rate 12 organizations and programs using a 5-star scale.


1 2 3 »

Top Stories on Commsrisk

Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody


Last Chance to Benchmark Your Leakage Coverage


A Brief Guide to the Digital Divide


Canada Postpones STIR/SHAKEN Deadline Yet Again



Mobile Money APIs, Society and Risk


Fake Cryptocurrency Wallets Found on Google and Apple App Stores


UK Regulator Hints at Considering STIR/SHAKEN


Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December



RAG TV Season 3

Commsrisk Editor Eric Priezkalns is back presenting a new season of RAG TV! Watch the replays if you miss the live show. Here is the season opener, where Eric and co-presenter Lee Scargall reviewed the events of 2020.

 

Recent Comments

  • Nadejda Papernaia Nadejda Papernaia 1 Apr 2021
    Stop Simbox Fraud in Your Network with AB Handshake
    Hi Tomislav. Thank you very much for questions. You wrote: Even though the handshake will be received, what is going to happen? Will you be disconnecting the calls or you will inform your roaming partner to disconnect the SIM card? The answer is following: the system detects in...
  • Tomislav Bučkal Tomislav Bučkal 31 Mar 2021
    Stop Simbox Fraud in Your Network with AB Handshake
    Hi, from my standpoint, the root cause is why 3rd party is receiving traffic. Even though the handshake will be received, what is going to happen? Will you be disconnecting the calls or you will inform your roaming partner to disconnect the SIM card? If let's say 2% of traffic...

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ▼2021 (75)
    • ▼April (11)
      • Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody
      • Last Chance to Benchmark Your Leakage Coverage
      • A Brief Guide to the Digital Divide
      • Canada Postpones STIR/SHAKEN Deadline Yet Again
      • Mobile Money APIs, Society and Risk
      • Fake Cryptocurrency Wallets Found on Google and Apple App Stores
      • UK Regulator Hints at Considering STIR/SHAKEN
      • Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December
      • Commsrisk Top Ten for March 2021
      • RAG TV: The Scale of A2P SMS Bypass Fraud
      • Leakage Coverage Study Extended to April 14
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Writers
  • Joseph Nderitu
    Joseph Nderitu
  • Rob Chapman
    Rob Chapman
  • Michael Lazarou
    Michael Lazarou
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Mike Willett
    Mike Willett
  • Dan Baker
    Dan Baker
  • David Morrow
    David Morrow
  • Ashwin Menon
    Ashwin Menon
  • Luke Taylor
    Luke Taylor
  • Daniel Peter
    Daniel Peter
  • Carlos Marques
    Carlos Marques
Recent Posts
  • Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody
  • Last Chance to Benchmark Your Leakage Coverage
  • A Brief Guide to the Digital Divide
  • Canada Postpones STIR/SHAKEN Deadline Yet Again
  • Mobile Money APIs, Society and Risk
  • Fake Cryptocurrency Wallets Found on Google and Apple App Stores
  • UK Regulator Hints at Considering STIR/SHAKEN
  • Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December
  • Commsrisk Top Ten for March 2021
  • RAG TV: The Scale of A2P SMS Bypass Fraud
  • Leakage Coverage Study Extended to April 14
  • Should Undersea Cables Be Defended as Military Targets?
  • Stop Simbox Fraud in Your Network with AB Handshake
  • Has the NetNumber SMS Hijack Vulnerability Been Fixed Already?
  • Police Fight a Losing Battle Against Encrypted Comms
  • Should Other Countries Copy the US Approach to Fraud and Spoofing?
  • Google Cloud Can Now Let Your Insurers Know How Secure You Really Are
  • Police Take Down Pirate Streaming App with 100mn Users
  • Disturbing New SMS Hijack Blamed on NetNumber IDs
  • Huawei and Other Chinese Suppliers Deemed Unacceptable Risk by US Comms Regulator
  • Why Are 74% of Operators Still Vulnerable to Signaling Attacks?
  • $583mn of A2P SMS Bypass Fraud during 2020 per Araxxe Tests
  • Why India Had to Suspend SMS Spam Blockchain Safelist
  • Majority Wants RAG Summer Conference in London
  • Benchmarking Leakage Coverage
  • Home
  • About
  • Contact
  • Sitemap
  • RSS

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.