• Home
  • About
  • Contact
  • Sitemap
  • RSS
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Data & Analytics
  • Privacy & IP
  • Digital Payments
  • Education
Latest
  • 22 Jan 2021 | The Assassin That Was Tricked by a Spoofed CLI
  • 21 Jan 2021 | Leadership for Africans (and Everyone Else)
  • 20 Jan 2021 | World’s Largest Dark Web Market Taken Down
  • 19 Jan 2021 | Racist Robocaller Fined $9.9mn
  • 18 Jan 2021 | RAG and GSMA FASG Top Poll of Respected RAFM Collaborations; GRAPA and CFCA at Bottom
  • 15 Jan 2021 | US City Ends Public Use of Facial Recognition by Private Sector
  • 14 Jan 2021 | Data, Debt and Appreciating Loyal Customers
  • 13 Jan 2021 | Wake Up Sleepy Customers to Revive Profits
  • 12 Jan 2021 | Wangiri Warnings in Poland and Paraguay
  • 11 Jan 2021 | RAFM Collaboration: Who Do You Know and Who Do You Respect?
> OTT bypass

International Bypass Fraud Nearing Extinction

By Kingsley Unah 21 May 2020 Risk, Fraud & Security

The inevitable decline of some revenue streams will kill certain types of fraud, but do not expect the fraudsters to take early retirement.


Bypass: Time for a Rethink?

By David Morrow 13 Feb 2018 Risk, Fraud & Security

Arguably telcos are being bullied into doing deals with Viber to secure some revenue from OTT bypass traffic.


User Survey and Tests Measure Impact of OTT Bypass

By Merve Şahin 31 May 2017 Risk, Fraud & Security

Our research shows that OTT bypass affects the quality of calls as well as revenues, but many users choose not to disable it.


OTT Bypass Is Biggest Threat to Mobile Operators, Says Revector Survey

By Eric Priezkalns 24 Oct 2016 Risk, Fraud & Security

We know OTT bypass is a serious issue, but it may take more than hyping the scale of the threat to overcome the obstacles.


More RAG Than Ever Before

By Rob Chapman 8 Feb 2016 Education & Conferences

The winter meeting of the Risk & Assurance Group (RAG) was very successful, but we want the event to deliver even more in 2016.


Araxxe Shares Data on Frequency of OTT Bypass

By Eric Priezkalns 18 Jan 2016 Risk, Fraud & Security

The French telecoms revenue and fraud specialists have a regional analysis of the frequency of OTT bypass, derived from the audits they have performed for customers.


Why OTT Bypass Could Kill Voice Revenues

By Thomas Wilson 23 Nov 2015 Risk, Fraud & Security

Analyzing trends in technology, regulation and pricing leads to terrifying conclusions about the threat posed by OTT bypass.


Knockout Agenda for Risk and Assurance Group

By Eric Priezkalns 28 Oct 2015 Assurance & Audit

With data from two global surveys, plus three case studies on new assurance, risk and anti-fraud techniques, everyone will want to attend the London RAG on November 12th.


Revector Launch OTT Bypass Detector

By Eric Priezkalns 27 Oct 2015 Risk, Fraud & Security

The British fraud specialists are responding to urgent demand from telcos, who are panicked by a surge in voice traffic being redirected to data networks to avoid termination fees.


The Art of Dialogue; Notes on Neural’s user forum

By Eric Priezkalns 8 Oct 2015 Education & Conferences

Neural demonstrate that to succeed in business, listening and caring for customers is as important as the delivery of advanced technology and content.


Subex: The Ultimate Guide to Leveraging AI/ML to Combat Fraud

Top Stories on Commsrisk

The Assassin That Was Tricked by a Spoofed CLI


Leadership for Africans (and Everyone Else)


World’s Largest Dark Web Market Taken Down


Racist Robocaller Fined $9.9mn



RAG and GSMA FASG Top Poll of Respected RAFM Collaborations; GRAPA and CFCA at Bottom


US City Ends Public Use of Facial Recognition by Private Sector


Data, Debt and Appreciating Loyal Customers


Wake Up Sleepy Customers to Revive Profits



Recent Comments

  • Wally Wally 12 Jan 2021
    RAFM Collaboration: Who Do You Know and Who Do You Respect?
    I don't half the groups on this list. Some of them must be doing almost nothing.
  • Adrian E. Garcia Adrian E. Garcia 18 Dec 2020
    Why Call Spoofing Will Not Be Stopped by Digital Signatures
    They are working on ensuring the interoperability of signatures between in-band and out-of-band solutions because they don’t want to undermine the large investment...

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ▼2021 (16)
    • ▼January (16)
      • The Assassin That Was Tricked by a Spoofed CLI
      • Leadership for Africans (and Everyone Else)
      • World's Largest Dark Web Market Taken Down
      • Racist Robocaller Fined $9.9mn
      • RAG and GSMA FASG Top Poll of Respected RAFM Collaborations; GRAPA and CFCA at Bottom
      • US City Ends Public Use of Facial Recognition by Private Sector
      • Data, Debt and Appreciating Loyal Customers
      • Wake Up Sleepy Customers to Revive Profits
      • Wangiri Warnings in Poland and Paraguay
      • RAFM Collaboration: Who Do You Know and Who Do You Respect?
      • Commsrisk Top Ten for 2020
      • Great Start for RAG TV Season 3
      • New Phone, New Billing Confusion
      • Police Take Down the 'Favorite' VPN of Criminals
      • The Commsrisk Review of 2020
      • Fraud Predictions for 2021
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Writers
  • Joseph Nderitu
    Joseph Nderitu
  • Rob Chapman
    Rob Chapman
  • Michael Lazarou
    Michael Lazarou
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Dan Baker
    Dan Baker
  • Mike Willett
    Mike Willett
  • David Morrow
    David Morrow
  • Ashwin Menon
    Ashwin Menon
  • Luke Taylor
    Luke Taylor
  • Daniel Peter
    Daniel Peter
  • Carlos Marques
    Carlos Marques
Recent Posts
  • The Assassin That Was Tricked by a Spoofed CLI
  • Leadership for Africans (and Everyone Else)
  • World’s Largest Dark Web Market Taken Down
  • Racist Robocaller Fined $9.9mn
  • RAG and GSMA FASG Top Poll of Respected RAFM Collaborations; GRAPA and CFCA at Bottom
  • US City Ends Public Use of Facial Recognition by Private Sector
  • Data, Debt and Appreciating Loyal Customers
  • Wake Up Sleepy Customers to Revive Profits
  • Wangiri Warnings in Poland and Paraguay
  • RAFM Collaboration: Who Do You Know and Who Do You Respect?
  • Commsrisk Top Ten for 2020
  • Great Start for RAG TV Season 3
  • New Phone, New Billing Confusion
  • Police Take Down the ‘Favorite’ VPN of Criminals
  • The Commsrisk Review of 2020
  • Fraud Predictions for 2021
  • Assured Revenues and Robust Supply Chains
  • RAG TV Is Back: Why Risk Pros Want Real Debate
  • Zoom Employee Charged with Sabotaging Meetings about Tiananmen Square Massacre
  • $28mn Penalty for Telco and Execs Accused of Fraud
  • The Unsung Heroes of 2020
  • Being Mindful of Hardship
  • Subex CEO Emphasizes Transition to ‘Multi-Vertical’ Vendor in TV Interview
  • Only 19% of IoT Firms Have a Security Vulnerability Disclosure Policy
  • Stakeholder Management: The Most Important Skill in Business Assurance?
  • Home
  • About
  • Contact
  • Sitemap
  • RSS

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.