5 Takeaways from the Verizon Data Breach Investigations Report 2023
It is no surprise that crime motivates most breaches but not all the findings are consistent with the attacks described by telcos.
It is no surprise that crime motivates most breaches but not all the findings are consistent with the attacks described by telcos.
An independent assessment found more than 25,000 devices are just waiting to be examined by British cops.
Argishti Khudaverdyan used phishing and social engineering to fool T‑Mobile employees into giving him access to corporate systems.
There has been a flurry of investigations into Chinese-owned firms that import or manufacture phones, including Huawei and Xiaomi.
The national regulator will be able to monitor and block any device with an IMEI.
A flagship Xiaomi 5G phone includes software that censors phrases like ‘free Tibet’ whilst Huawei users are at risk from malicious apps.
Muhammad Fahd bribed AT&T insiders like Marc Sapatin to unlock handsets and infect the operator’s systems with malware.
Piles of cash and other assets were seized from organized criminals who used a series of companies to buy and sell handsets in order to cheat the VAT system of EUR30mn.
An interruption to the supply chain can also cause an interruption to revenues, both in telecoms and other sectors.
Sensitive management of access to each phone will maintain cash flow during a time when customers are under financial pressure.