By using this web site you accept our use of cookies. More information about cookies
Accept
Infopulse - Expert Software Engineering, Infrastructure Management Services
By using this web site you accept our use of cookies. More information about cookies
Accept
Infopulse - Expert Software Engineering, Infrastructure Management Services
Infopulse - Expert Software Engineering, Infrastructure Management Services
reCAPTCHA
Send message Please fill in this quick form and we will send you a free quote shortly.
* Required fields
Your privacy is important to us. We will never share your data.
Subscribe to our updates Be among the first to get exclusive content on IT insights, innovations, and best practices.
* Required fields
Your privacy is important to us. We will never share your data.
Subscribe to our New career opportunities Please fill in this quick form to be among the first to receive our updates.
* Required fields
Your privacy is important to us. We will never share your data.
reCAPTCHA
* Required fields
Your privacy is important to us. We will never share your data.
Default avatar Send an email to person Please fill in this quick form to contact our expert directly.
* Required fields
Your privacy is important to us. We will never share your data.
Read the Full Case Study Don't miss the most interesting part of the story!
Submit this quick form to see the rest and to freely access all case studies on our website.
* Required fields
Your privacy is important to us. We will never share your data.
Infopulse - Expert Software Engineering, Infrastructure Management Services

Telecom

June 25, 2020  |  Telecom  |  Ievgenii Kachalka
SMS Fraud Cases and Recommended Measures to Prevent Them

This is the third post from A Definitive Guide to Telecom Security, aimed at providing an extensive overview of possible security issues. Following the publication on voice fraud, this article highlights the most common messaging fraud cases and countermeasures to prevent them.

Read more
June 10, 2020  |  Telecom  |  Andrii Ivanov
Combating Voice Fraud: Best Practices from a Telecom Expert

Last year, the total losses experienced due to voice fraud constituted $28 billion with International Revenue Interconnect Bypass and Traffic Pumping leading the way as top offenders. So how do you fight back? By understanding how the common voice scams are engineered and implementing advanced detection mechanisms for identifying those early signs of fraud en masse....

Read more
April 30, 2020  |  Telecom  |  Ievgenii Kachalka
A Definitive Guide to Telecom Security: SS7 Network Protocols

Recently, mobile networks have been the most dynamic part of communication infrastructure and instrumental to perform daily activities ranging from voice calls and SMS to providing signalling for emergency services and critical infrastructure. Telecom network infrastructure enables transmission of subscribers’ location, metadata and communication content.

Read more
April 07, 2020  |  Telecom  |  Alla Oliinyk
Security in Telecom: 5 Current Cyber Threats and Solutions

Communication networks need to be resilient. Especially, as the scope, variety, and complexity of current cyber security threats are increasing exponentially. The growing volume of data transmissions, legacy technology, and signaling protocols, the increased role of cloud technologies and "old-fashioned" DNS and DDoS attacks are among the most common "bullets" telcos need to dodge on a daily basis....

Read more
1 2 3