Fraud & Identity Fraud & Identity

Fraud & Identity Featured Article

August 05, 2017

Fraud & Identity Today Week in Review: Australian Tax Office, Callsign & More

Welcome to the week in review, where we take a look at all the top stories making headlines in the mobile fraud space this week.

The week started off with the news that ABC Australia, an employee of the Australian Tax Office compliance agency, recently published details about how to hack mobile phones in a posting on LinkedIn. TMC’s Paula Bernier highlights the implications of this posting by writing, “The posting provided step-to-step directions on how to bypass passwords and obtain data even on phones with dead batteries or no SIM cards, the report said. Using this blueprint, reports indicate, bad actors could access phone call records and text messages, and retrieve deleted data.” Everything you need to know is HERE.

Next up, we discussed those pesky texts you’ve most likely been getting that are from unknown people. Most of the time, the person texting or calling is looking for someone else, and chances are that that person used to have the same phone number as you. This confusion is due to recycled numbers, which involve phone numbers being reassigned. While this may just be an inconvenience for the recipient, it can spell big trouble for companies if they’re working off of old outreach subscription lists. Find out more HERE.

Meanwhile, Callsign, a five-year-old authentication platform provider, recently raised $35 million in a Series A round. Accel and PTB Ventures led the round, in which Allegis Capital and NightDragon Security also participated. As Bernier points out, “The money will enable Callsign to expand across the U.S. and the Far East. The London-based company plans to open offices in the Bay Area and New York City this year.” Continue reading HERE.

Finally, the week rounded out with a look at BYOD policies. They certainly make life easier for employees, but can become a major headache for companies and IT personnel when it comes to fraud and security issues. After all, the idea of all your employees walking around with sensitive business data at their fingertips is a bit scary, given the number of hackers out there. Special guest contributor Manish Bhardwaj, Sr. Marketing Manager, Middle East and Turkey at Aruba, a Hewlett Packard Enterprise company, says that BYOD doesn’t have to be a problem, though. Find out why HERE

That’s all for this week. Come back next week to read all the latest fraud-related news.

Article comments powered by Disqus

Industry Insights

(MobileID) Proactive Fraud Prevention

Interconnect-related fraud such as International Revenue Share Fraud (IRSF) and PBX hacking fraud continue to be a billion dollar problem to the telecom industry.

(Defender Shield) Defense solutions for the modern SMS ecosystem

SMS is a ubiquitous communication method for person-to-person (P2P) text messaging, which has been in use globally for nearly 20 years.

(Defender Shield) Preventing Grey Routes and the Multi-billion dollar Threat

The convenience of mobile messaging has brought communication efficiency to billions of consumers worldwide. As is often the case with widely accepted technologies; however, convenience can provide a vulnerable gateway to fraudulent activity.

Product Documents

Asset Protect

While unlimited or high-volume voice and SMS plans offer great value to subscribers, sometimes fraudsters exploit these plans to avoid paying termination and interconnect fees.

Defender Shield

In a world with ever-increasing Application-to-Person (A2P) messaging needs and competition, improving customer satisfaction and eliminating revenue leakage is key for protecting SMS profits.


Accurate and cost-efficient routing of voice calls and SMS is critical. Unfortunately, gathering reliable routing data on ported numbers and keeping up with constant changes in number plans is expensive and time-consuming.

Fraud Solutions

Communications fraud is a $20B annual global problem and growing. Companies are looking for peace of mind so that their business and their customers are protected from the onslaught of technology crime that is damaging their reputations and their balance sheets.