Fraud & Identity Fraud & Identity

Fraud & Identity Featured Article

Fraud & Identity Today Week in Review: SIM-Swap, Mobile Payment and Telecom Fraud

March 18, 2017

Welcome to the week in review, where we take a look at all the top stories making headlines in the mobile fraud space this week.

This week we took a closer look at the various kinds of fraud, all of which seem to be growing in popularity over the years. First up, Michael Guta explored SIM-Swap fraud. He explains what SIM-Swap fraud is by writing, “This is a type of fraud in which criminals register the current number of a legitimate customer on a new SIM card. If you happen to use your mobile phone for banking or other financial transactions, the fraudster is able to intercept vital information that allows them to gain access to your bank, credit cards and other personal information.” This can turn into a major problem, especially if your bank uses your SIM card for verification purposes when you call in. Luckily, companies have acknowledged this problem and are creating solutions to fight it. Find out how HERE.

The issue of mobile payment security was also explored this week. TMC’s Laura Stotler reported on a survey from Oxford Economics which points out that most people are interested in mobile payments, but are afraid to use the function due to security concerns. These concerns are 100 percent understandable, and the company that finally figures out how to solve this issue will undoubtedly reap the rewards. Everything you need to know is HERE.

Telecom fraud was also discussed this week. Steve Anderson took a look at some statistics surrounding telecom fraud—from when it first became a noticed problem to now. Although there are solutions out there that can help, the drop in telecom fraud hasn’t been as high as hoped. Luckily, companies are taking notice and putting out even more advanced solutions to combat the revenue leakage that always goes along with fraudulent activity. Find out more HERE.

Finally, the week rounded out with the news that iconectiv’s director of product management, Chip Stevens, will be giving a talk regarding the issues that networks face in terms of potential fraud. He will also discuss some means of protecting against those issues, as well as how to prevent some of those problems from ever happening in the first place. Steve Anderson has everything you need to know HERE.

That’s all for this week. Come back next week to read all the latest fraud-related news.

Article comments powered by Disqus

Industry Insights

(MobileID) Proactive Fraud Prevention

Interconnect-related fraud such as International Revenue Share Fraud (IRSF) and PBX hacking fraud continue to be a billion dollar problem to the telecom industry.

(Defender Shield) Defense solutions for the modern SMS ecosystem

SMS is a ubiquitous communication method for person-to-person (P2P) text messaging, which has been in use globally for nearly 20 years.

(Defender Shield) Preventing Grey Routes and the Multi-billion dollar Threat

The convenience of mobile messaging has brought communication efficiency to billions of consumers worldwide. As is often the case with widely accepted technologies; however, convenience can provide a vulnerable gateway to fraudulent activity.

Product Documents

Asset Protect

While unlimited or high-volume voice and SMS plans offer great value to subscribers, sometimes fraudsters exploit these plans to avoid paying termination and interconnect fees.

Defender Shield

In a world with ever-increasing Application-to-Person (A2P) messaging needs and competition, improving customer satisfaction and eliminating revenue leakage is key for protecting SMS profits.


Accurate and cost-efficient routing of voice calls and SMS is critical. Unfortunately, gathering reliable routing data on ported numbers and keeping up with constant changes in number plans is expensive and time-consuming.

Fraud Solutions

Communications fraud is a $20B annual global problem and growing. Companies are looking for peace of mind so that their business and their customers are protected from the onslaught of technology crime that is damaging their reputations and their balance sheets.