55.9%
Loading...
55.9%
Loading...

Privacy & Intellectual Property

Hunting for Rogue Base Stations at MWC Barcelona

How would you detect a surveillance device at the world's biggest convention for mobile communications?

The Privacy Risk with Satellite Backhaul

When GEO satellite internal link encryption is considered a non-priority, your information might just get broadcasted continent-wide, for anyone to intercept and see.

New IoT Security Vulnerability Disclosure Report Highlights Progress among Retailers

British retailers are doing an excellent job of protecting the public and Walmart has improved greatly, but be wary of cheap networked products sold on Amazon.

7-Year Prison Sentence for Fake Airplane Wi‑Fi Scammer Who Copied Private Sex Images from Women’s Phones

Michael Clapsis used his network engineering skills to access the devices of passengers.

SK Telecom Loses 840,000 Mobile Users after Data Breach; Changes CEO

Jung Jaihun is tasked with shifting the emphasis away from the losses caused by this year's massive data breach and towards the value created by serving AI.

Will the UK Ban VPNs?

Probably not, but a surge of downloads for Virtual Private Network (VPN) providers has demonstrated why democracies will struggle to control what people see.

Belgium Tightens Controls on SIM Swaps Following Orange Privacy Breach

Hackers obtained data about 850,000 customers of Orange Belgium.

Data Breach at Bouyges Telecom Affects 6.4mn Customers

Management gave the usual blah blah about how much they care about the security of customer data, except this time it was said in French.

Choicejacking: A New Way to Compromise Mobile Phones through Public Charging Points

Researchers used cheap chargers to circumvent operating system controls and download files from phones in just one-third of a second.

What an American Hacker’s Methods Tells Us about a Flaw in Fraud Prevention Strategies

Cameron Wagenius used an online alias to sell customer data stolen from Verizon and AT&T while he was serving in the US Army.

Rethinking PRINS: Why 5G SA Roaming Security Needs a Smarter Path to 6G

Roaming has historically introduced opportunities to infringe privacy. We should be moving towards a better privacy model for roaming with 6G.

Researchers Use Leaked Data to Demonstrate SMS Fraud and SS7 Surveillance

Gabriel Geiger and Crofton Black are proving the existence of vulnerabilities that many comms industry insiders consciously choose to ignore.

The Commsrisk Global Fraud Dashboard


Our Global Fraud Dashboard uses AI-powered search to collate, update and visualize data about scams and other network abuses from around the world. New charts are added each month. See it here.

Get Our Weekly Newsletter by Email