• Home
  • About
  • Contact
  • Sitemap
  • RSS
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
Latest
  • 15 Apr 2021 | Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody
  • 14 Apr 2021 | Last Chance to Benchmark Your Leakage Coverage
  • 13 Apr 2021 | A Brief Guide to the Digital Divide
  • 12 Apr 2021 | Canada Postpones STIR/SHAKEN Deadline Yet Again
  • 9 Apr 2021 | Mobile Money APIs, Society and Risk
  • 8 Apr 2021 | Fake Cryptocurrency Wallets Found on Google and Apple App Stores
  • 7 Apr 2021 | UK Regulator Hints at Considering STIR/SHAKEN
  • 6 Apr 2021 | Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December
  • 5 Apr 2021 | Commsrisk Top Ten for March 2021
  • 2 Apr 2021 | RAG TV: The Scale of A2P SMS Bypass Fraud
> security

Only 19% of IoT Firms Have a Security Vulnerability Disclosure Policy

By Eric Priezkalns 22 Dec 2020 Risk, Fraud & Security

A new report from the IoT Security Foundation reveals the complacency of many suppliers of networked devices.


Canadian Operator TELUS Guest Edits IEEE Magazine on Privacy and Security by Design

By Eric Priezkalns 19 Sep 2019 Privacy & Intellectual Property

The deadline for submissions is 30th September.


Mobileum’s Acquisition of Evolved Intelligence Signals Shift in Security Spending

By Eric Priezkalns 1 Nov 2018 Risk, Fraud & Security

UK signaling security firm Evolved Intelligence has been purchased by US mobile analytics business Mobileum.


HardenStance Network Security Sales Index Q2 2018

By Patrick Donegan 19 Sep 2018 Risk, Fraud & Security

The Hardenstance index tracks sales by eight important vendors of network security. Last quarter was positive; most vendors enjoyed a significant rise in sales year-on-year.


How to Secure Email

By Eric Priezkalns 19 Jul 2018 Privacy & Intellectual Property

There have been several attempts to improve the security and privacy of email. A new academic paper explores why each attempt has struggled to gain acceptance.


Security in NFC

By Andy Gent 24 Jul 2015 Risk, Fraud & Security

Thanks to a variety of security advantages, mobile phones equipped with near field communications can make payments safer.


Messages of Death Signal Comms Fragility

By Eric Priezkalns 9 Jun 2015 Risk, Fraud & Security

Nobody wants to be knocked off the network because of a few naughty characters. But recent incidents are a useful reminder that the systems we rely upon can sometimes be brittle.


NowSecure Says Leaky Apps Greater Risk Than Mobile Malware

By Eric Priezkalns 27 Mar 2015 Risk, Fraud & Security

Andrew Hoog, CEO of NowSecure, says 60 percent of mobile apps suffer at least one high-risk security flaw.


RIMS to Host Mobile Cybersecurity Tweet Chat

By Eric Priezkalns 12 Mar 2015 Risk, Fraud & Security

Vinny Sakore, Assistant HIPAA Security Officer at Verizon, will take to Twitter to discuss and field questions about “cybersecurity risks in a mobile device world”.


Mixed Messages on Privacy and Security at MWC

By Eric Priezkalns 9 Mar 2015 Risk, Fraud & Security

Vittorio Colao, Vodafone Group CEO, has been praised for talking about security and privacy during his speech at Mobile World Congress. But did he say enough? And was it undermined by what DT CEO Timotheus Hottges said afterwards?


1 2 3 … 5 »

Top Stories on Commsrisk

Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody


Last Chance to Benchmark Your Leakage Coverage


A Brief Guide to the Digital Divide


Canada Postpones STIR/SHAKEN Deadline Yet Again



Mobile Money APIs, Society and Risk


Fake Cryptocurrency Wallets Found on Google and Apple App Stores


UK Regulator Hints at Considering STIR/SHAKEN


Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December



RAG TV Season 3

Commsrisk Editor Eric Priezkalns is back presenting a new season of RAG TV! Watch the replays if you miss the live show. Here is the season opener, where Eric and co-presenter Lee Scargall reviewed the events of 2020.

 

Recent Comments

  • Nadejda Papernaia Nadejda Papernaia 1 Apr 2021
    Stop Simbox Fraud in Your Network with AB Handshake
    Hi Tomislav. Thank you very much for questions. You wrote: Even though the handshake will be received, what is going to happen? Will you be disconnecting the calls or you will inform your roaming partner to disconnect the SIM card? The answer is following: the system detects in...
  • Tomislav Bučkal Tomislav Bučkal 31 Mar 2021
    Stop Simbox Fraud in Your Network with AB Handshake
    Hi, from my standpoint, the root cause is why 3rd party is receiving traffic. Even though the handshake will be received, what is going to happen? Will you be disconnecting the calls or you will inform your roaming partner to disconnect the SIM card? If let's say 2% of traffic...

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ▼2021 (75)
    • ▼April (11)
      • Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody
      • Last Chance to Benchmark Your Leakage Coverage
      • A Brief Guide to the Digital Divide
      • Canada Postpones STIR/SHAKEN Deadline Yet Again
      • Mobile Money APIs, Society and Risk
      • Fake Cryptocurrency Wallets Found on Google and Apple App Stores
      • UK Regulator Hints at Considering STIR/SHAKEN
      • Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December
      • Commsrisk Top Ten for March 2021
      • RAG TV: The Scale of A2P SMS Bypass Fraud
      • Leakage Coverage Study Extended to April 14
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Writers
  • Joseph Nderitu
    Joseph Nderitu
  • Rob Chapman
    Rob Chapman
  • Michael Lazarou
    Michael Lazarou
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Mike Willett
    Mike Willett
  • Dan Baker
    Dan Baker
  • David Morrow
    David Morrow
  • Ashwin Menon
    Ashwin Menon
  • Luke Taylor
    Luke Taylor
  • Carlos Marques
    Carlos Marques
  • Daniel Peter
    Daniel Peter
Recent Posts
  • Why Closing the Digital Divide with Smart Credit and Smart Security Is Good for Everybody
  • Last Chance to Benchmark Your Leakage Coverage
  • A Brief Guide to the Digital Divide
  • Canada Postpones STIR/SHAKEN Deadline Yet Again
  • Mobile Money APIs, Society and Risk
  • Fake Cryptocurrency Wallets Found on Google and Apple App Stores
  • UK Regulator Hints at Considering STIR/SHAKEN
  • Australia Blocked 11mn Wangiri and 44mn Spoofed Calls Since December
  • Commsrisk Top Ten for March 2021
  • RAG TV: The Scale of A2P SMS Bypass Fraud
  • Leakage Coverage Study Extended to April 14
  • Should Undersea Cables Be Defended as Military Targets?
  • Stop Simbox Fraud in Your Network with AB Handshake
  • Has the NetNumber SMS Hijack Vulnerability Been Fixed Already?
  • Police Fight a Losing Battle Against Encrypted Comms
  • Should Other Countries Copy the US Approach to Fraud and Spoofing?
  • Google Cloud Can Now Let Your Insurers Know How Secure You Really Are
  • Police Take Down Pirate Streaming App with 100mn Users
  • Disturbing New SMS Hijack Blamed on NetNumber IDs
  • Huawei and Other Chinese Suppliers Deemed Unacceptable Risk by US Comms Regulator
  • Why Are 74% of Operators Still Vulnerable to Signaling Attacks?
  • $583mn of A2P SMS Bypass Fraud during 2020 per Araxxe Tests
  • Why India Had to Suspend SMS Spam Blockchain Safelist
  • Majority Wants RAG Summer Conference in London
  • Benchmarking Leakage Coverage
  • Home
  • About
  • Contact
  • Sitemap
  • RSS

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.