Skip to content

Is Your Business Impacted by IRSF Attacks? We Can Help

International Revenue Share Fraud (IRSF) attacks. They are one of the telcom industry’s most persistent problems and when your business is targeted, it costs you money. IRSF has been steadily increasing over the past 10 years and its perpetrators are dedicated to ensuring that it continues to be a highly profitable and hard-to-stop crime. We’ve

The Cost-Effective Way to Verify Users and Increase Security

Headlines around the world remind us that breaches have become commonplace for far too many businesses. Establishing reliable end-user security is now a requirement for any Web or mobile application in the market.  Phone-based verification is a simple way to help protect your brand and your business, and more specifically for end-users, extending security options

Common Questions About Two-Factor Authentication

Websites worldwide offer two-factor authentication (2FA), but a large number of consumers do not fully understand the technology, and therefore have not taken the steps to turn it on and protect their accounts. To help make the Internet a safer place for all, we decided to jump in and answer some frequently asked questions about

7 Things You Need to Know about International SMS

Ok, I get it, international SMS is complicated, now what? If your business needs international reach with SMS, make sure to ask these questions of any potential vendor: Understanding all the intricacies of International SMS messaging can be daunting, especially if your provider doesn’t give you much help. However, if global reach is a necessity

Lessons on Online Relationships from the Manti Te’o Hoax

Whether or not you’re an avid college football fan, you’ve probably heard some recent news coverage about the Manti Te’o hoax. Manti Te’o is the Notre Dame linebacker and 2012 Heisman Trophy runner-up whose romantic relationship with girlfriend Lennay Kekua was publicly revealed to be a hoax.  Te’o had dated Kekua online from October 2011

Social Networks: The Real Cost of Hacking and Spam (Part 2)

Last time we talked about how much fraud costs an individual user when an online account is compromised. What happens to a social network’s user once they leave? Do they ever come back or are they forever a lost customer? In a digital age where the newest thing is always one step away, the answer

Social Networks: The Real Cost of Hacking and Spam (Part 1)

A prominent blogger’s social networking account was hacked earlier this year. According to the article, the account was hacked, and the blogger’s username, password, and phone number listed on the website were used to set up another fake account to spam her friends with fake solicitations for branded goods. To top it off, the hackers

5 Easy Password Best Practices to Protect Yourself from a Hack!

In light of Mat Honan’s recent hacking nightmare, it has become apparent that we all need to be more proactive about our personal account security. Here are 5 Password Best Practices: 1. Use strong passwords – the more complex your password is, the harder it is for fraudsters to guess it or hack it. 2.

Can Biometrics be Fooled?

In the movies, iris scanning protects high-security vaults and super-secret labs while personalizing billboard ads. In the real world, it helps New York City police track prisoners, screens employees of Bank of America Corp. and travelers at London’s Heathrow Airport. Outside of transplanting dead eye balls, as Tom Cruise did in Minority Report, surely you