• Home
  • About
  • Contact
  • Sitemap
  • RSS
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Data & Analytics
  • Privacy & IP
  • Digital Payments
  • Education
Latest
  • 25 Jan 2021 | Why Are Fair Usage Policies So Inconsistent?
  • 22 Jan 2021 | The Assassin That Was Tricked by a Spoofed CLI
  • 21 Jan 2021 | Leadership for Africans (and Everyone Else)
  • 20 Jan 2021 | World’s Largest Dark Web Market Taken Down
  • 19 Jan 2021 | Racist Robocaller Fined $9.9mn
  • 18 Jan 2021 | RAG and GSMA FASG Top Poll of Respected RAFM Collaborations; GRAPA and CFCA at Bottom
  • 15 Jan 2021 | US City Ends Public Use of Facial Recognition by Private Sector
  • 14 Jan 2021 | Data, Debt and Appreciating Loyal Customers
  • 13 Jan 2021 | Wake Up Sleepy Customers to Revive Profits
  • 12 Jan 2021 | Wangiri Warnings in Poland and Paraguay
> twitter

RAG TV: Boosting Profits with Engineering Governance

By Eric Priezkalns 23 Jul 2020 Assurance & Audit

Yesterday’s episode of RAG TV saw Nikhil Sehgal of Colt explaining the role of engineering governance, and Steffen Öftring of SIGOS talking about web-based risk training.


FBI Investigates Hacking of Elite Twitter Accounts by Bitcoin Scammers

By Eric Priezkalns 17 Jul 2020 Risk, Fraud & Security

Some suspect insiders were paid to give access to the accounts of VIPs including Barack Obama, Elon Musk and Kanye West.


5G Masts Burned in Coronavirus Panic

By Eric Priezkalns 7 Apr 2020 General

Fake news stories circulated on WhatsApp claim that the coronavirus epidemic began in Wuhan because it was the first city with a 5G network.


SIM Swappers Tweet from Twitter CEO’s Account

By Eric Priezkalns 2 Sep 2019 Risk, Fraud & Security

The hackers known as ChucklingSquad have repeated their SIM swapping tricks with Jack Dorsey, founder and CEO of Twitter, becoming their latest victim.


Should Social Networks Do More to Stop Account Takeover?

By Eric Priezkalns 11 Jan 2019 Risk, Fraud & Security

Not unless users do more to protect themselves.


SMS Used to Hijack UK Celebrity Twitter Accounts

By Eric Priezkalns 31 Dec 2018 Privacy & Intellectual Property

Some questioned the ethics and legality of the stunt, but it does raise the question of why Twitter still allows users to manage their accounts via SMS.


French Tribunal Scrubs Twitter’s Right to Exploit User Content

By IPKat 17 Oct 2018 Privacy & Intellectual Property

Twitter’s global terms and conditions conflict with French law by claiming broad rights to copy and share user content.


When Is a Twitter Bot Not a Twitter Bot?

By Eric Priezkalns 23 Jul 2018 Data & Analytics

The social media giant gathers lots of data but cannot distinguish between a bot and a person, as shown by the ‘outing’ of supposed Russian bots that are actually real-life Americans.


Absurdity Is Surrounding Social Media

By Eric Priezkalns 5 Apr 2018 Privacy & Intellectual Property

Much of what people say about the need to control social media seems influenced by competition to be the center of attention.


John McAfee Says Phone Was ‘Compromised’

By Eric Priezkalns 2 Jan 2018 Risk, Fraud & Security

Is this a sign that SIM swappers have started to target VIPs?


1 2 »
Subex: The Ultimate Guide to Leveraging AI/ML to Combat Fraud

Top Stories on Commsrisk

Why Are Fair Usage Policies So Inconsistent?


The Assassin That Was Tricked by a Spoofed CLI


Leadership for Africans (and Everyone Else)


World’s Largest Dark Web Market Taken Down



Racist Robocaller Fined $9.9mn


RAG and GSMA FASG Top Poll of Respected RAFM Collaborations; GRAPA and CFCA at Bottom


US City Ends Public Use of Facial Recognition by Private Sector


Data, Debt and Appreciating Loyal Customers



Recent Comments

  • Wally Wally 12 Jan 2021
    RAFM Collaboration: Who Do You Know and Who Do You Respect?
    I don't half the groups on this list. Some of them must be doing almost nothing.
  • Adrian E. Garcia Adrian E. Garcia 18 Dec 2020
    Why Call Spoofing Will Not Be Stopped by Digital Signatures
    They are working on ensuring the interoperability of signatures between in-band and out-of-band solutions because they don’t want to undermine the large investment...

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ▼2021 (17)
    • ▼January (17)
      • Why Are Fair Usage Policies So Inconsistent?
      • The Assassin That Was Tricked by a Spoofed CLI
      • Leadership for Africans (and Everyone Else)
      • World's Largest Dark Web Market Taken Down
      • Racist Robocaller Fined $9.9mn
      • RAG and GSMA FASG Top Poll of Respected RAFM Collaborations; GRAPA and CFCA at Bottom
      • US City Ends Public Use of Facial Recognition by Private Sector
      • Data, Debt and Appreciating Loyal Customers
      • Wake Up Sleepy Customers to Revive Profits
      • Wangiri Warnings in Poland and Paraguay
      • RAFM Collaboration: Who Do You Know and Who Do You Respect?
      • Commsrisk Top Ten for 2020
      • Great Start for RAG TV Season 3
      • New Phone, New Billing Confusion
      • Police Take Down the 'Favorite' VPN of Criminals
      • The Commsrisk Review of 2020
      • Fraud Predictions for 2021
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Writers
  • Joseph Nderitu
    Joseph Nderitu
  • Rob Chapman
    Rob Chapman
  • Michael Lazarou
    Michael Lazarou
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Mike Willett
    Mike Willett
  • Dan Baker
    Dan Baker
  • David Morrow
    David Morrow
  • Ashwin Menon
    Ashwin Menon
  • Luke Taylor
    Luke Taylor
  • Carlos Marques
    Carlos Marques
  • Daniel Peter
    Daniel Peter
Recent Posts
  • Why Are Fair Usage Policies So Inconsistent?
  • The Assassin That Was Tricked by a Spoofed CLI
  • Leadership for Africans (and Everyone Else)
  • World’s Largest Dark Web Market Taken Down
  • Racist Robocaller Fined $9.9mn
  • RAG and GSMA FASG Top Poll of Respected RAFM Collaborations; GRAPA and CFCA at Bottom
  • US City Ends Public Use of Facial Recognition by Private Sector
  • Data, Debt and Appreciating Loyal Customers
  • Wake Up Sleepy Customers to Revive Profits
  • Wangiri Warnings in Poland and Paraguay
  • RAFM Collaboration: Who Do You Know and Who Do You Respect?
  • Commsrisk Top Ten for 2020
  • Great Start for RAG TV Season 3
  • New Phone, New Billing Confusion
  • Police Take Down the ‘Favorite’ VPN of Criminals
  • The Commsrisk Review of 2020
  • Fraud Predictions for 2021
  • Assured Revenues and Robust Supply Chains
  • RAG TV Is Back: Why Risk Pros Want Real Debate
  • Zoom Employee Charged with Sabotaging Meetings about Tiananmen Square Massacre
  • $28mn Penalty for Telco and Execs Accused of Fraud
  • The Unsung Heroes of 2020
  • Being Mindful of Hardship
  • Subex CEO Emphasizes Transition to ‘Multi-Vertical’ Vendor in TV Interview
  • Only 19% of IoT Firms Have a Security Vulnerability Disclosure Policy
  • Home
  • About
  • Contact
  • Sitemap
  • RSS

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.