• Home
  • About
  • Contact
  • Sitemap
  • RSS
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
Latest
  • 15 Apr 2021 | Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody
  • 14 Apr 2021 | Last Chance to Benchmark Your Leakage Coverage
  • 13 Apr 2021 | A Brief Guide to the Digital Divide
  • 12 Apr 2021 | Canada Postpones STIR/SHAKEN Deadline Yet Again
  • 9 Apr 2021 | Mobile Money APIs, Society and Risk
  • 8 Apr 2021 | Fake Cryptocurrency Wallets Found on Google and Apple App Stores
  • 7 Apr 2021 | UK Regulator Hints at Considering STIR/SHAKEN
  • 6 Apr 2021 | Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December
  • 5 Apr 2021 | Commsrisk Top Ten for March 2021
  • 2 Apr 2021 | RAG TV: The Scale of A2P SMS Bypass Fraud
> hacking

Notorious SIM-Swapping, Malware-Spreading, Bomb-Threatening Hackers Arrested

By Eric Priezkalns 28 Sep 2020 Risk, Fraud & Security

The accused are said to have harassed enemies by taking control of phone accounts and sending bomb threats to 1,066 kindergartens.


Chinese Fugitives Charged with Hacking 100 Firms Including Telcos

By Eric Priezkalns 23 Sep 2020 Risk, Fraud & Security

Deputy Attorney General Jeffrey Rosen said the Chinese state had made the country ‘safe for their own cyber criminals’.


Is GRAPA Giving Loans to Unemployed RAFM Managers?

By Eric Priezkalns 22 Jul 2020 Education & Conferences

If you create lots of different websites for multiple front organizations you may fail to notice when one has been hacked.


Vigilante Hacker Spies on Scam Call Center Using Their Own CCTV and Call Recording Systems

By Eric Priezkalns 4 Mar 2020 Risk, Fraud & Security

Fraudsters in Gurgaon, India, were raided by police after British hacker Jim Browning published recordings of their crimes.


Dutch Withdraw 100 Phone Numbers Used for Fake Help Desks

By Eric Priezkalns 28 Feb 2020 Risk, Fraud & Security

The numbers were used by English-speaking fraudsters wanting to obtain remote access to their victims’ computers.


Hackers Fool Telco Staff into Installing Remote Desktop Software, Claims Magazine

By Eric Priezkalns 13 Feb 2020 Risk, Fraud & Security

Persuading the unwary to allow remote access to their computers is an old trick, but it supposedly is used to execute SIM swaps.


T-Mobile US Data Breach Hits Million Prepay Customers

By Eric Priezkalns 25 Nov 2019 Privacy & Intellectual Property

Though no financial data was compromised, there will be an increased risk of account takeovers.


Persistent Cyber Attack Targeted Networks for Years

By Rob Chapman 7 Aug 2019 Risk, Fraud & Security

Investigation work by security consultancy Cybereason found that a group of state-sponsored hackers have been gradually infiltrating telco networks since at least 2012.


Did Saudi Arabia Hack the Amazon CEO’s Phone?

By Marianne Curphey 18 Apr 2019 Risk, Fraud & Security

The Saudis have undoubtedly invested in spytech, but not everyone agrees they were involved in a conspiracy to blackmail Jeff Bezos.


The Vulnerability of Voicemail

By Eric Priezkalns 24 Aug 2018 Risk, Fraud & Security

Security engineer Martin Vigo has shown how quick and easy it is to hack anybody’s voicemail. That access can then be used to take control of WhatsApp, PayPal and more.


1 2 3 4 »

Top Stories on Commsrisk

Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody


Last Chance to Benchmark Your Leakage Coverage


A Brief Guide to the Digital Divide


Canada Postpones STIR/SHAKEN Deadline Yet Again



Mobile Money APIs, Society and Risk


Fake Cryptocurrency Wallets Found on Google and Apple App Stores


UK Regulator Hints at Considering STIR/SHAKEN


Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December



RAG TV Season 3

Commsrisk Editor Eric Priezkalns is back presenting a new season of RAG TV! Watch the replays if you miss the live show. Here is the season opener, where Eric and co-presenter Lee Scargall reviewed the events of 2020.

 

Recent Comments

  • Nadejda Papernaia Nadejda Papernaia 1 Apr 2021
    Stop Simbox Fraud in Your Network with AB Handshake
    Hi Tomislav. Thank you very much for questions. You wrote: Even though the handshake will be received, what is going to happen? Will you be disconnecting the calls or you will inform your roaming partner to disconnect the SIM card? The answer is following: the system detects in...
  • Tomislav Bučkal Tomislav Bučkal 31 Mar 2021
    Stop Simbox Fraud in Your Network with AB Handshake
    Hi, from my standpoint, the root cause is why 3rd party is receiving traffic. Even though the handshake will be received, what is going to happen? Will you be disconnecting the calls or you will inform your roaming partner to disconnect the SIM card? If let's say 2% of traffic...

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ▼2021 (75)
    • ▼April (11)
      • Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody
      • Last Chance to Benchmark Your Leakage Coverage
      • A Brief Guide to the Digital Divide
      • Canada Postpones STIR/SHAKEN Deadline Yet Again
      • Mobile Money APIs, Society and Risk
      • Fake Cryptocurrency Wallets Found on Google and Apple App Stores
      • UK Regulator Hints at Considering STIR/SHAKEN
      • Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December
      • Commsrisk Top Ten for March 2021
      • RAG TV: The Scale of A2P SMS Bypass Fraud
      • Leakage Coverage Study Extended to April 14
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Writers
  • Joseph Nderitu
    Joseph Nderitu
  • Rob Chapman
    Rob Chapman
  • Michael Lazarou
    Michael Lazarou
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Mike Willett
    Mike Willett
  • Dan Baker
    Dan Baker
  • David Morrow
    David Morrow
  • Ashwin Menon
    Ashwin Menon
  • Luke Taylor
    Luke Taylor
  • Daniel Peter
    Daniel Peter
  • Carlos Marques
    Carlos Marques
Recent Posts
  • Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody
  • Last Chance to Benchmark Your Leakage Coverage
  • A Brief Guide to the Digital Divide
  • Canada Postpones STIR/SHAKEN Deadline Yet Again
  • Mobile Money APIs, Society and Risk
  • Fake Cryptocurrency Wallets Found on Google and Apple App Stores
  • UK Regulator Hints at Considering STIR/SHAKEN
  • Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December
  • Commsrisk Top Ten for March 2021
  • RAG TV: The Scale of A2P SMS Bypass Fraud
  • Leakage Coverage Study Extended to April 14
  • Should Undersea Cables Be Defended as Military Targets?
  • Stop Simbox Fraud in Your Network with AB Handshake
  • Has the NetNumber SMS Hijack Vulnerability Been Fixed Already?
  • Police Fight a Losing Battle Against Encrypted Comms
  • Should Other Countries Copy the US Approach to Fraud and Spoofing?
  • Google Cloud Can Now Let Your Insurers Know How Secure You Really Are
  • Police Take Down Pirate Streaming App with 100mn Users
  • Disturbing New SMS Hijack Blamed on NetNumber IDs
  • Huawei and Other Chinese Suppliers Deemed Unacceptable Risk by US Comms Regulator
  • Why Are 74% of Operators Still Vulnerable to Signaling Attacks?
  • $583mn of A2P SMS Bypass Fraud during 2020 per Araxxe Tests
  • Why India Had to Suspend SMS Spam Blockchain Safelist
  • Majority Wants RAG Summer Conference in London
  • Benchmarking Leakage Coverage
  • Home
  • About
  • Contact
  • Sitemap
  • RSS

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.