• Home
  • About
  • Contact
  • Advertising
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Spam
  • Cold War 2
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
  • The Commsrisk Show
Latest
  • 3 Feb 2023 | Commsrisk Top Ten for January 2023
  • 2 Feb 2023 | Disconnecting Twilio Would Have Been a Disaster; How Do We Stop Illegal Robocalls Pushing Us to the Brink?
  • 1 Feb 2023 | Is Netflix Going to Kick 100 Million Viewers Off Its Platform?
  • 31 Jan 2023 | GVG and Guinea Fight in US Court Over $22mn Fee for Terminating National RA Contract
  • 30 Jan 2023 | Singapore to Flag All A2P SMS from Unregistered Senders as ‘Likely Scam’
  • 27 Jan 2023 | Engineer Arrested for Wiretapping Opponents of Former Mexico City Mayor
  • 26 Jan 2023 | FCC Threatens to Disconnect Twilio for Illegal Robocalls
  • 25 Jan 2023 | Ericsson Allocates $220mn for More Corruption Penalties
  • 24 Jan 2023 | 73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules
  • 23 Jan 2023 | How Bad Was the New T-Mobile API Data Breach?
> security

Protecting Mobile Money Agents from Robbery

By Joseph Nderitu 5 Aug 2021 Digital Money

The cash held by mobile money agents makes them a target for criminals. Telcos should work with insurers to create policies that will help agents to manage the risk.


Only 19% of IoT Firms Have a Security Vulnerability Disclosure Policy

By Eric Priezkalns 22 Dec 2020 Risk, Fraud & Security

A new report from the IoT Security Foundation reveals the complacency of many suppliers of networked devices.


Canadian Operator TELUS Guest Edits IEEE Magazine on Privacy and Security by Design

By Eric Priezkalns 19 Sep 2019 Privacy & Intellectual Property

The deadline for submissions is 30th September.


Mobileum’s Acquisition of Evolved Intelligence Signals Shift in Security Spending

By Eric Priezkalns 1 Nov 2018 Risk, Fraud & Security

UK signaling security firm Evolved Intelligence has been purchased by US mobile analytics business Mobileum.


HardenStance Network Security Sales Index Q2 2018

By Patrick Donegan 19 Sep 2018 Risk, Fraud & Security

The Hardenstance index tracks sales by eight important vendors of network security. Last quarter was positive; most vendors enjoyed a significant rise in sales year-on-year.


How to Secure Email

By Eric Priezkalns 19 Jul 2018 Privacy & Intellectual Property

There have been several attempts to improve the security and privacy of email. A new academic paper explores why each attempt has struggled to gain acceptance.


Security in NFC

By Andy Gent 24 Jul 2015 Risk, Fraud & Security

Thanks to a variety of security advantages, mobile phones equipped with near field communications can make payments safer.


Messages of Death Signal Comms Fragility

By Eric Priezkalns 9 Jun 2015 Risk, Fraud & Security

Nobody wants to be knocked off the network because of a few naughty characters. But recent incidents are a useful reminder that the systems we rely upon can sometimes be brittle.


NowSecure Says Leaky Apps Greater Risk Than Mobile Malware

By Eric Priezkalns 27 Mar 2015 Risk, Fraud & Security

Andrew Hoog, CEO of NowSecure, says 60 percent of mobile apps suffer at least one high-risk security flaw.


RIMS to Host Mobile Cybersecurity Tweet Chat

By Eric Priezkalns 12 Mar 2015 Risk, Fraud & Security

Vinny Sakore, Assistant HIPAA Security Officer at Verizon, will take to Twitter to discuss and field questions about “cybersecurity risks in a mobile device world”.


1 2 3 … 5 »

Latest Stories on Commsrisk

Commsrisk Top Ten for January 2023


Disconnecting Twilio Would Have Been a Disaster; How Do We Stop Illegal Robocalls Pushing Us to the Brink?


Is Netflix Going to Kick 100 Million Viewers Off Its Platform?


GVG and Guinea Fight in US Court Over $22mn Fee for Terminating National RA Contract



Singapore to Flag All A2P SMS from Unregistered Senders as ‘Likely Scam’


Engineer Arrested for Wiretapping Opponents of Former Mexico City Mayor


FCC Threatens to Disconnect Twilio for Illegal Robocalls


Ericsson Allocates $220mn for More Corruption Penalties



73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules


How Bad Was the New T-Mobile API Data Breach?


Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement


Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam



Commsrisk on Twitter

Tweets from @commsrisk

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ►2023 (25)
    • ►February (3)
    • ►January (22)
  • ►2022 (260)
    • ►December (22)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (22)
    • ►April (21)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2021 (262)
    • ►December (23)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (22)
    • ►July (22)
    • ►June (23)
    • ►May (21)
    • ►April (22)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Leading Contributors
  • Joseph Nderitu
    Joseph Nderitu
  • Michael Lazarou
    Michael Lazarou
  • David Morrow
    David Morrow
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Mike Willett
    Mike Willett
Recent Posts
  • Commsrisk Top Ten for January 2023
  • Disconnecting Twilio Would Have Been a Disaster; How Do We Stop Illegal Robocalls Pushing Us to the Brink?
  • Is Netflix Going to Kick 100 Million Viewers Off Its Platform?
  • GVG and Guinea Fight in US Court Over $22mn Fee for Terminating National RA Contract
  • Singapore to Flag All A2P SMS from Unregistered Senders as ‘Likely Scam’
  • Engineer Arrested for Wiretapping Opponents of Former Mexico City Mayor
  • FCC Threatens to Disconnect Twilio for Illegal Robocalls
  • Ericsson Allocates $220mn for More Corruption Penalties
  • 73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules
  • How Bad Was the New T-Mobile API Data Breach?
  • Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement
  • Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam
  • Home
  • About
  • Contact
  • Advertising

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT