CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Telecommunications
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Telecommunications

Hacker holding a telephone receiver and working on computer showing data breach via support agent
Cyber SecurityNews

Hackers in Cox Communications Data Breach Impersonated Company’s Support Agent to Access Customer Information

December 23, 2021
Cox communications data breach notification disclosed that unauthorized individual(s) accessed sensitive customer information after impersonating the company's support agent.
Read More
Telecommunication antenna receiver on cell phone tower with 5G showing challenge of legacy signalling protocols
Cyber SecurityInsights

Legacy Signalling Protocols: The Challenge for Network Operators

September 30, 2021
While 5G promises to be faster, more accessible and more secure, network operators are still challenged by legacy signalling protocols that are still readily used today, although security for these is limited.
Read More
Logo of T-Mobile on shopfront showing data breach of customer data
Cyber SecurityNews

T-Mobile Data Breach: 100 Million Customer Data Records Compromised Including Social Security, Driver’s License & Unique Device Numbers

August 19, 2021
T-Mobile appears to have suffered a devastating data breach as a reported 100 million records have appeared for sale on a dark web forum. The customer data is about as sensitive as possible, containing accurate Social Security and driver's license numbers.
Read More
Metallic lock on mobile phone showing data breach
Cyber SecurityNews

Hackers Access Personal and Call Information and Port Numbers in Mint Mobile Data Breach

July 22, 2021
Hackers accessed subscribers’ information and ported their mobile numbers in the Mint data breach after potentially compromising a subscriber management software or a user account.
Read More
Smart digital city with connection network showing need for IoT security
Cyber SecurityInsights

Telcos and PAM: A Response to the Next Wave of IoT

May 6, 2021
By providing hosted services to businesses, telcos will need to consider privilege access management to secure not only their own infrastructure, but also that of their clients.
Read More
Close-up of hands scanning fingerprint on smartphone showing data breach of customer data via CRM software
Cyber SecurityNews

Hackers Accessed UScellular Customer Data and Ported Numbers After Breaching Company’s CRM Software

February 4, 2021
Hackers breached UScellular’s retail CRM software and accessed customer data, including PIN and CPNI, and ported some subscribers’ mobile phone numbers to a different carrier.
Read More
T-Mobile store exterior and sign showing second data breach
Cyber SecurityNews

Second Data Breach in 2020 for T-Mobile Exposed Customer and Call-Related Information of 200,000 Subscribers

January 11, 2021
T-Mobile disclosed a second data breach in 2020 in which hackers illegally accessed call-related and customer proprietary network information for about 200,000 subscribers.
Read More
Satellite dish sending data showing cyber attacks for telecom industry
Cyber SecurityInsights

Telecom Corporate Accounts at Highest Risk for Cyber Attacks

October 8, 2020
With so many employees, subscribers, and seemingly unlimited data out there, the telecom industry is a prime target for cybercriminals looking for a profit.
Read More
China Telecom company logo showing federal agencies urging FCC to consider China Telecom a national security threat
Cyber SecurityNews

FCC Urged to Consider China Telecom a National Security Threat

April 22, 2020
Federal agencies urged FCC to consider China Telecom a national security threat, pointing to concerns that the company is vulnerable to exploitation, influence, and control by the Chinese government.
Read More
Transmitters on telecommunication tower showing how privacy is a key concern for mobile carriers when handling telco data
Data PrivacyInsights

Uncovering the Value of Carrier-Based Intelligence for a Privacy-First World

April 21, 2020
Privacy is a key concern for mobile carriers when combining telco data with AI to create higher value intelligence entities while enforcing anonymized and filtered data.
Read More
Load More

Latest

Man holding mobile phone showing SMS phishing attack

SMS Phishing Attack Compromised Twilio Leaking Customer Data, Targeted Cloudflare

Digital yuan gold coin over yuan banknotes showing PBOC privacy protection for CBDC

Privacy Protection Coming for Digital Yuan? PBOC Promises “Respect” for Personal Information

World map on a technological background showing data privacy laws and cross-border data sharing

Navigating Evolving Data Privacy Laws and Cross-Border Data Sharing

Boy using phone in bed at night showing cyber safety and end-to-end encryption

UK Government Wrestles With Balance Between Child Cyber Safety and Legitimate End-to-End Encryption Purposes as Agencies Endorse Client-Side Scanning

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results