• Home
  • About
  • Contact
  • Advertising
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Spam
  • Cold War 2
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
  • The Commsrisk Show
Latest
  • 31 Mar 2023 | Mobile Games Used to Steal Cryptocurrency
  • 30 Mar 2023 | IoT Safety, Flash Calls, SMS Blasters and Bilateral Spam Accords: Episode 3 of The Commsrisk Show
  • 29 Mar 2023 | Why the Internet of Things Must Be Decentralized
  • 28 Mar 2023 | US Security Agencies Broke IMSI-Catcher Laws
  • 27 Mar 2023 | 20 Year Old Founder of Forum for Data Breaches and Hackers Arrested
  • 24 Mar 2023 | 3 Reasons to Question the Recent Anti-Spam Agreement between Australia and the UK
  • 23 Mar 2023 | Ukraine, National Security, Defamation and Robocalls: Watch Episode 2 of The Communications Risk Show
  • 22 Mar 2023 | ‘Winter Vivern’ Hackers Target Pro-Ukraine Telcos
  • 21 Mar 2023 | Facebook Experiments with Flash Calls
  • 20 Mar 2023 | Sixth Suspect Arrested for Massive Paris IMSI-Catcher SMS Scam
> 2023 February

US Lawmakers Propose Prison Sentences for Illegal Robocallers (But Would They Ever Be Used?)

By Eric Priezkalns 28 Feb 2023 Nuisance & Spam

The latest incarnation of the DO NOT Call Act might as well be named the EMPTY THREAT Act.


Refusing to Share Fraud Data Is Turning Telcos into Scapegoats

By Eric Priezkalns 27 Feb 2023 Data & Analytics

British MPs said telcos ‘lack engagement’ with fraud prevention. Why are telcos not anticipating a drive for more anti-fraud cooperation?


FBI Says SIM Swapper Hijacked Accounts of Instagram Influencers to Sexually Harass Them

By Eric Priezkalns 24 Feb 2023 Risk, Fraud & Security

Amir Hossein Golshan is alleged to have demanded dates and masturbated whilst a victim performed a striptease by video call.


GVG to Speak at United Nations ‘AI for Good’ Summit

By Eric Priezkalns 23 Feb 2023 Education & Conferences

The ITU illustrates how few background checks are performed before privately-owned businesses are trusted to roll out powerful new forms of network surveillance.


Six Arrested for Swapping SIMs and Forging IDs to Raid a Million Dollars from Bank Accounts

By Eric Priezkalns 22 Feb 2023 Risk, Fraud & Security

Hijacking the phone services of victims was part of a process that culminated with bank withdrawals made in person using fake ID.


Paris IMSI-Catcher Mistaken for Bomb Was Actually Used for Health Insurance SMS Phishing Scam

By Eric Priezkalns 21 Feb 2023 Privacy & Intellectual Property

Regular readers may remember the arrest of a drugged-up driver who carried a mysterious device in the back of her car.


Elon Musk Has Radical Solution for A2P SMS Fraud: Twitter Turns Off 2-Factor Authentication by SMS

By Eric Priezkalns 20 Feb 2023 Risk, Fraud & Security

Comms providers will fear other businesses may follow Twitter’s lead by telling users to adopt different modes of authentication.


FCC Broadband Map Shenanigans Shows How Crony Capitalism Really Works

By Eric Priezkalns 17 Feb 2023 Assurance & Audit

Some US businesses are so complacent when lying about broadband coverage that they accidentally admit the lies to each other.


Hackers Reveal El Salvador Bought Comms Spy Equipment from President’s Friend

By Eric Priezkalns 16 Feb 2023 Privacy & Intellectual Property

Official documents show USD2.2mn was spent on web and mobile surveillance services and tools, possibly including IMSI-catchers.


Lawmakers Plan to Reveal Chinese Influence on US Telecoms

By Eric Priezkalns 15 Feb 2023 Cold War 2

The FACT Act would make the public aware of any US comms provider that has a hostile government as a stakeholder.


1 2 »

Replay Our Discussion Show from March 29

Join Commsrisk Editor Eric Priezkalns, tech analyst Ed Finegold and telco executive Lee Scargall at tv.commsrisk.com every Wednesday for conversation with risk experts from around the world of electronic communications.
Our new show featured David Rogers, Chair of the GSMA Fraud and Security Group, discussing research he has performed into the state of security practices for manufacturers of IoT devices.

Latest Stories on Commsrisk

Mobile Games Used to Steal Cryptocurrency


IoT Safety, Flash Calls, SMS Blasters and Bilateral Spam Accords: Episode 3 of The Commsrisk Show


Why the Internet of Things Must Be Decentralized


US Security Agencies Broke IMSI-Catcher Laws



20 Year Old Founder of Forum for Data Breaches and Hackers Arrested


3 Reasons to Question the Recent Anti-Spam Agreement between Australia and the UK


Ukraine, National Security, Defamation and Robocalls: Watch Episode 2 of The Communications Risk Show


‘Winter Vivern’ Hackers Target Pro-Ukraine Telcos



Commsrisk on Twitter

Tweets from @commsrisk

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ►2023 (65)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2022 (260)
    • ►December (22)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (22)
    • ►April (21)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2021 (262)
    • ►December (23)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (22)
    • ►July (22)
    • ►June (23)
    • ►May (21)
    • ►April (22)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Leading Contributors
  • Joseph Nderitu
    Joseph Nderitu
  • Michael Lazarou
    Michael Lazarou
  • David Morrow
    David Morrow
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Mike Willett
    Mike Willett
Recent Posts
  • Mobile Games Used to Steal Cryptocurrency
  • IoT Safety, Flash Calls, SMS Blasters and Bilateral Spam Accords: Episode 3 of The Commsrisk Show
  • Why the Internet of Things Must Be Decentralized
  • US Security Agencies Broke IMSI-Catcher Laws
  • 20 Year Old Founder of Forum for Data Breaches and Hackers Arrested
  • 3 Reasons to Question the Recent Anti-Spam Agreement between Australia and the UK
  • Ukraine, National Security, Defamation and Robocalls: Watch Episode 2 of The Communications Risk Show
  • ‘Winter Vivern’ Hackers Target Pro-Ukraine Telcos
  • Facebook Experiments with Flash Calls
  • Sixth Suspect Arrested for Massive Paris IMSI-Catcher SMS Scam
  • Is China Deliberately Cutting Taiwan’s Internet Cables?
  • Watch Episode 1 of The Communications Risk Show
  • Home
  • About
  • Contact
  • Advertising

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT