• Home
  • About
  • Contact
  • Advertising
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
  • Advertising
Latest
  • 24 Jun 2022 | Mobile vs Desktop: How Do You Read Commsrisk?
  • 23 Jun 2022 | The Wangiri Fraud That Was Mostly a Billing Error
  • 22 Jun 2022 | Regulator Warns Telco for Failing to Investigate Spam
  • 21 Jun 2022 | Huge Budget Rise Needed to Replace Chinese Tech in US Networks
  • 20 Jun 2022 | UK Government Proposes Heavy Fines for Spam Calls and Texts
  • 17 Jun 2022 | Saying African Telcos Are ‘Inadequately Prepared’ for Mobile Money Fraud Smacks of Unconscious Racism
  • 16 Jun 2022 | What If China Created a Rival to the US STIR/SHAKEN Program?
  • 15 Jun 2022 | New i3forum-RAG Survey Focuses on International Wholesale Fraud
  • 14 Jun 2022 | Widespread Reporting of Flubot ‘Takedown’ Shows How Little We Really Know
  • 13 Jun 2022 | New GVG National Revenue Assurance Tracking System Launched in Zimbabwe
> 2021 September

Content Piracy: What You Don’t Know Can Hurt You

By Carlos Marques 30 Sep 2021 Privacy & Intellectual Property

The unlawful distribution of copyrighted content consumes almost a quarter of all internet bandwidth. Comms providers should automate the discovery of piracy on their networks.


Deutsche Telekom Chief Security Officer Tells Security Teams To Be More Entrepreneurial

By Eric Priezkalns 29 Sep 2021 Risk, Fraud & Security

Thomas Tschersich believes the key to realizing security by design is to turn security functions from cost centers into sources of value.


New Test Data from Araxxe Shows 3:1 Ratio for Underbilling and Overbilling Errors

By Eric Priezkalns 28 Sep 2021 Assurance & Audit

The specialist testing business reports a relative increase in underbilling errors compared to statistics they published in 2019.


‘Get Rid’ of Chinese Phones Says Lithuanian Minister after Discovery of Censorship Software

By Eric Priezkalns 27 Sep 2021 Privacy & Intellectual Property

A flagship Xiaomi 5G phone includes software that censors phrases like ‘free Tibet’ whilst Huawei users are at risk from malicious apps.


Why the Business of Data Analytics Is Even More Complicated than You Imagined

By Conor Lennon 24 Sep 2021 Data & Analytics

Combining analytics with software as a service led to an explosion in the number of disparate data repositories maintained by companies.


Pegasus Spyware Zero-Click Exploit Shows Why Messaging Apps Need To Be More Secure

By Eric Priezkalns 23 Sep 2021 Privacy & Intellectual Property

Researchers discovered a method to compromise Apple devices by attaching bogus GIF files to a message.


Commsrisk Advertising Auction Closes October 4

By Eric Priezkalns 22 Sep 2021 General

Submit your bid for a chance to advertise on the leading website for risk specialists working in the electronic communications sector.


12-Year Prison Sentence for $200mn Handset Fraudster

By Eric Priezkalns 21 Sep 2021 Risk, Fraud & Security

Muhammad Fahd bribed AT&T insiders like Marc Sapatin to unlock handsets and infect the operator’s systems with malware.


Subex Rebrands IoT and OT Cybersecurity Products

By Eric Priezkalns 20 Sep 2021 Risk, Fraud & Security

The creation of the new Sectrio brand highlights Subex’s desire to expand beyond their historic base in telecoms by selling network security products across many sectors.


SMS-Sending Spyware Preinstalled on Some Russian and Chinese Feature Phones

By Eric Priezkalns 17 Sep 2021 Privacy & Intellectual Property

A researcher tested various phones and found some sent messages that cost money whilst others signed users up for online services.


1 2 3 »

Top Stories on Commsrisk

Mobile vs Desktop: How Do You Read Commsrisk?


The Wangiri Fraud That Was Mostly a Billing Error


Regulator Warns Telco for Failing to Investigate Spam


Huge Budget Rise Needed to Replace Chinese Tech in US Networks



UK Government Proposes Heavy Fines for Spam Calls and Texts


Saying African Telcos Are ‘Inadequately Prepared’ for Mobile Money Fraud Smacks of Unconscious Racism


What If China Created a Rival to the US STIR/SHAKEN Program?


New i3forum-RAG Survey Focuses on International Wholesale Fraud



RAG RAFMCS Survey Results

Watch Eric Priezkalns give his summary of the largest ever survey of revenue assurance, fraud management and cybersecurity (RAFMCS) pros working for communications providers worldwide.

 

Recent Comments

  • Eric Priezkalns Eric Priezkalns 20 Jun 2022
    New Data Shows Big Flaw in STIR/SHAKEN Is Now Even Worse
    You don't need to apologize, Dennis. The only person who was pedantic about the word 'authentication' was me. But I have reason to be pedantic as there is confusion between how the word is used by a...
  • Dennis Dupont Dennis Dupont 20 Jun 2022
    New Data Shows Big Flaw in STIR/SHAKEN Is Now Even Worse
    Sorry if I was being pedantic about that one word. I have been in the business of reading and implementing specs, so I may get hung up on them. Either way I think we have converged onto the root of...

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ►2022 (125)
    • ►June (18)
    • ►May (22)
    • ►April (21)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2021 (262)
    • ►December (23)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (22)
    • ►July (22)
    • ►June (23)
    • ►May (21)
    • ►April (22)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Leading Contributors
  • Joseph Nderitu
    Joseph Nderitu
  • Michael Lazarou
    Michael Lazarou
  • Rob Chapman
    Rob Chapman
  • Marianne Curphey
    Marianne Curphey
  • David Morrow
    David Morrow
  • Lee Scargall
    Lee Scargall
Recent Posts
  • Mobile vs Desktop: How Do You Read Commsrisk?
  • The Wangiri Fraud That Was Mostly a Billing Error
  • Regulator Warns Telco for Failing to Investigate Spam
  • Huge Budget Rise Needed to Replace Chinese Tech in US Networks
  • UK Government Proposes Heavy Fines for Spam Calls and Texts
  • Saying African Telcos Are ‘Inadequately Prepared’ for Mobile Money Fraud Smacks of Unconscious Racism
  • What If China Created a Rival to the US STIR/SHAKEN Program?
  • New i3forum-RAG Survey Focuses on International Wholesale Fraud
  • Widespread Reporting of Flubot ‘Takedown’ Shows How Little We Really Know
  • New GVG National Revenue Assurance Tracking System Launched in Zimbabwe
  • AML Compliance for High-Growth E-wallet Markets
  • Ex-MI6 Spy Chief Says His Emails Were Hacked; Warns Against Simplistic Interpretation of Russia’s Methods
  • Home
  • About
  • Contact
  • Advertising

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT