• Home
  • About
  • Contact
  • Advertising
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Spam
  • Cold War 2
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Media
  • The Commsrisk Show
Latest
  • 27 Sep 2023 | T-Mobile US Denies Claims of Another Data Breach
  • 26 Sep 2023 | $116mn Fine for Toll-Free Fraudster Who Embarrassed US Telecoms Industry with His Anti-Scam Antics
  • 25 Sep 2023 | Oslo IMSI-Catcher Arrest: Suspected Malaysian Spy Now Investigated for Fraud ‘with International Ramifications’
  • 22 Sep 2023 | At Last, a Bank that Authenticates Its Call to You
  • 21 Sep 2023 | Quantum Hacking, Job Cuts, and Measuring Fraud: Commsrisk Show Episode 5
  • 20 Sep 2023 | New NSO Group Zero-Click Exploits Show Why Privacy Hackers Will Always Defeat Apple (and Everyone Else)
  • 19 Sep 2023 | Preparations for Quantum Hacking Accelerate
  • 18 Sep 2023 | Regulator Says It Does Not Illegally Supply Phone Numbers of Nigerians to Telemarketers
  • 15 Sep 2023 | SIM Swap Social Engineering of T-Mobile Staff Blamed for $691,000 NFT Heist
  • 14 Sep 2023 | Brazil’s Unique Way of Tackling Spam Calls: Commsrisk Show Episode 4
> handsets

5 Takeaways from the Verizon Data Breach Investigations Report 2023

By Eric Priezkalns 28 Jun 2023 Data & Analytics

It is no surprise that crime motivates most breaches but not all the findings are consistent with the attacks described by telcos.


UK Police Failing to Gather Evidence from Huge Backlog of Mobile Phones

By Eric Priezkalns 8 Dec 2022 Data & Analytics

An independent assessment found more than 25,000 devices are just waiting to be examined by British cops.


Scammer Made $25mn by Unlocking Phones Using Stolen T‑Mobile Credentials

By Eric Priezkalns 10 Aug 2022 Risk, Fraud & Security

Argishti Khudaverdyan used phishing and social engineering to fool T‑Mobile employees into giving him access to corporate systems.


Chinese Telecoms Vendors Battle Indian Authorities over Tax Claims

By David Morrow 9 Aug 2022 General

There has been a flurry of investigations into Chinese-owned firms that import or manufacture phones, including Huawei and Xiaomi.


Nigeria Issues RFQ for National Phone Tracking System to ‘Fight Cybercrime and Insecurity’

By Eric Priezkalns 9 May 2022 Privacy & Intellectual Property

The national regulator will be able to monitor and block any device with an IMEI.


‘Get Rid’ of Chinese Phones Says Lithuanian Minister after Discovery of Censorship Software

By Eric Priezkalns 27 Sep 2021 Privacy & Intellectual Property

A flagship Xiaomi 5G phone includes software that censors phrases like ‘free Tibet’ whilst Huawei users are at risk from malicious apps.


12-Year Prison Sentence for $200mn Handset Fraudster

By Eric Priezkalns 21 Sep 2021 Risk, Fraud & Security

Muhammad Fahd bribed AT&T insiders like Marc Sapatin to unlock handsets and infect the operator’s systems with malware.


14 Arrested for Mobile Phone Tax Scam

By Eric Priezkalns 15 Jul 2021 Risk, Fraud & Security

Piles of cash and other assets were seized from organized criminals who used a series of companies to buy and sell handsets in order to cheat the VAT system of EUR30mn.


Assured Revenues and Robust Supply Chains

By Eric Priezkalns 31 Dec 2020 Assurance & Audit

An interruption to the supply chain can also cause an interruption to revenues, both in telecoms and other sectors.


Debt, Payments and Handsets: How a Global Crisis Leads Revenue Assurance to Find a New Balance

By Dion Price 3 Dec 2020 Assurance & Audit

Sensitive management of access to each phone will maintain cash flow during a time when customers are under financial pressure.


1 2 3 »

Replay The Commsrisk Show

Every Wednesday we stream The Communications Risk Show, a live discussion program covering the big risks faced by comms providers and their customers. If you missed the latest episode then watch the replay below.
Ian Deakin of the Alliance for Telecommunications Industry Solutions was our expert guest, and he explained the threat that quantum hacking poses to comms providers and the work being done to mitigate it. Guest presenter Sarah Delphey of Numeracle joined regular hosts Lee Scargall and Eric Priezkalns for a conversation about promoting the benefits of cost assurance and defending fraud managers from budget cuts.

Latest Stories on Commsrisk

T-Mobile US Denies Claims of Another Data Breach


$116mn Fine for Toll-Free Fraudster Who Embarrassed US Telecoms Industry with His Anti-Scam Antics


Oslo IMSI-Catcher Arrest: Suspected Malaysian Spy Now Investigated for Fraud ‘with International Ramifications’


At Last, a Bank that Authenticates Its Call to You



Get Our Weekly Newsletter by Email

* indicates required

/* real people should not fill this in and expect good things – do not remove this or risk form bot signups */

Archives
  • ►2023 (193)
    • ►September (19)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2022 (260)
    • ►December (22)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (22)
    • ►April (21)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2021 (262)
    • ►December (23)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (22)
    • ►July (22)
    • ►June (23)
    • ►May (21)
    • ►April (22)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Leading Contributors
  • Joseph Nderitu
    Joseph Nderitu
  • Michael Lazarou
    Michael Lazarou
  • David Morrow
    David Morrow
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Dan Baker
    Dan Baker
Recent Posts
  • T-Mobile US Denies Claims of Another Data Breach
  • $116mn Fine for Toll-Free Fraudster Who Embarrassed US Telecoms Industry with His Anti-Scam Antics
  • Oslo IMSI-Catcher Arrest: Suspected Malaysian Spy Now Investigated for Fraud ‘with International Ramifications’
  • At Last, a Bank that Authenticates Its Call to You
  • Quantum Hacking, Job Cuts, and Measuring Fraud: Commsrisk Show Episode 5
  • New NSO Group Zero-Click Exploits Show Why Privacy Hackers Will Always Defeat Apple (and Everyone Else)
  • Preparations for Quantum Hacking Accelerate
  • Regulator Says It Does Not Illegally Supply Phone Numbers of Nigerians to Telemarketers
  • SIM Swap Social Engineering of T-Mobile Staff Blamed for $691,000 NFT Heist
  • Brazil’s Unique Way of Tackling Spam Calls: Commsrisk Show Episode 4
  • 1,207 Chinese Scam Suspects Arrested and Deported from Myanmar
  • i3forum to Begin Talks with National Regulators about Multilateral CLI Validation
  • Home
  • About
  • Contact
  • Advertising

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT