Technical Deep Dives

Under-the-hood explainers on telecom fraud detection technology—covering signaling protocols, network architecture, SS7, STIR/SHAKEN, and the engineering behind 1Route’s three-pillar defense strategy for carriers and enterprises operating in complex, high-risk environments.

Uncategorized

Recognizing and Avoiding Phishing Scams

Although technology and security measures are improving daily, some scammers are creating new ways and advancing their phishing scams every day. Many scammers use text messages and emails to trick you into giving out your personal information. However, there are several things you can do to protect yourself from these scams. Keep reading to find […]

Uncategorized

Real-Time Fraud Blocking

Everyone finds unwanted calls annoying, and we have the numbers to back up that statement. The FCC says that more people complain about unwanted and spoofed robocalls than any other cellular activity. After a slight decline in robocalls during 2019 and mid-2020, criminals made up for lost time during 2021. One report shows that Americans received 165.1 million robocalls per […]

Fraud Prevention & Telecom Security Fraud Prevention & Telecom Security Fraud Prevention & Telecom Security

The Most Common Spam Call Myths Debunked: Part 2 

The Most Common Spam Call Myths Debunked: Part 2  Any way you slice it, spam calls are annoying.  At some point in your life, you’ve probably had to deal with unwanted callers. While spam calling has been around for a while, researchers have finally collected enough data to challenge some commonly held beliefs regarding robocalling. In […]

Fraud Prevention & Telecom Security STIR/SHAKEN & Regulatory Compliance Technical Deep Dives Technical Deep Dives Technical Deep Dives Technical Deep Dives Technical Deep Dives Technical Deep Dives

The Most Common Spam Call Myths Debunked

We’re sure you’re familiar with the nuisance that is a spam call. You’ve probably had to deal with the incessant ringing from phone numbers you don’t know, just to finally answer the phone to a prerecorded robotic voice on the other end of the line. While we all know this experience far too well, there […]

Uncategorized

RAG Online: Stopping the Spoofing of Calls

Jim McEachern of ATIS, Jeffrey Ross of GBSD Technologies and Sergey Okhrimenko of LANCK Telecom tell Eric Priezkalns about which methods they each advocate for validating the origin of calls and preventing CLI spoofing. These methods include STIR/SHAKEN and the A&B Number Handshake.

Uncategorized

RAG TV S3E9: Invalid Caller IDs and Fraud

The spoofing of calling line identification (CLI), also known as caller ID, is exploited by fraudsters around the world. Regular presenters Eric Priezkalns and Lee Scargall speak to Pedro Rabacal, CTO of Vodacom Mozambique, and Jeffrey Ross of GBSD Technologies and 1Route about the issues and new solutions that are in development.