CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Telecommunications
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Telecommunications

China Telecom company logo showing federal agencies urging FCC to consider China Telecom a national security threat
Cyber SecurityNews

FCC Urged to Consider China Telecom a National Security Threat

April 22, 2020
Federal agencies urged FCC to consider China Telecom a national security threat, pointing to concerns that the company is vulnerable to exploitation, influence, and control by the Chinese government.
Read More
Transmitters on telecommunication tower showing how privacy is a key concern for mobile carriers when handling telco data
Data PrivacyInsights

Uncovering the Value of Carrier-Based Intelligence for a Privacy-First World

April 21, 2020
Privacy is a key concern for mobile carriers when combining telco data with AI to create higher value intelligence entities while enforcing anonymized and filtered data.
Read More
Man using laptop with communication network map showing FCC proposing large fines to wireless carriers for failure to secure location data
Data PrivacyNews

FCC Proposes Large Fines to Wireless Carriers for Failure to Secure Location Data, But Will It Really Deter Irresponsible Third-Party Sales?

March 18, 2020
Four of the largest U.S. wireless carriers, T-Mobile, AT&T, Verizon and Sprint, face a potential collective fine of $200 million for failing to secure location data sold to third parties.
Read More
China smoke flag on a black background showing Chinese hackers engaging in cyber espionage by stealing text messages and phone records from telecom companies
Cyber SecurityNews

Chinese Hackers Now Stealing Text Messages, Phone Records From Telecom Companies

November 12, 2019
New report shows Chinese hackers engaging in cyber espionage by stealing SMS messages and phone records to track and monitor top diplomats and foreign leaders.
Read More
Twitter’s login screen on mobile phone showing the rise on SIM swap attack which includes the recent Twitter hack on their CEO’s account
Cyber SecurityNews

SIM Swap Attacks on the Rise; Twitter Hack Nabs CEO Jack Dorsey’s Account

September 6, 2019
SIM swap attack is on the rise which includes the recent Twitter hack on their CEO’s account. Attackers used social engineering to convince telco to switch target’s number to their own SIM cards.
Read More
Picture of a cup of coffee showing the sharing session with AT&T CPO on how privacy policy supports human progress
Data PrivacyInsights

Coffee with Privacy Pros: “Privacy Policy is Human Progress”

August 21, 2019
Hear what AT&T CPO, Tom Moore, has to say about the company’s privacy policy and how it supports the mission to inspire human progress through the power of communication and entertainment.
Read More
Man using mobile on the street showing potential impact of Sprint data breach on T-Mobile merger
Cyber SecurityNews

Sprint Data Breach Exposes Customers to Unknown Attackers; Will This Impact the T-Mobile Merger?

July 25, 2019
Sprint claims recent data breach will not cause risk to fraud or identify theft but the compromised customer information could lead to SIM swap attacks and allow attackers to take over victim’s accounts.
Read More
Huawei company logo showing addressing cyber threats should be a bigger concern than Huawei being a vendor in 5G
Cyber SecurityInsights

Is Huawei or the Exploding Cyber threat the Biggest Concern for 5G?

July 19, 2019
Exclusion of Huawei from U.S. market is a distraction from addressing cyber threats in 5G networks where much greater number of connected devices could be subjected to attacks.
Read More
Picture of telecommunication tower showing cyber espionage by Chinese hackers through data breach at global telecoms
Cyber SecurityNews

Chinese Hackers Demonstrate Their Global Cyber Espionage Reach with Breach at 10 of the World’s Biggest Telecoms

July 8, 2019
Cybereason recently exposed a multi-year cyber espionage operation carried out by Chinese hackers where they follow their targets moving from country to country by hopping from one breached network to another.
Read More
Businessman touching internet of things in 5G network showing the push of 5G IoT market towards edge computing
Data PrivacyInsights

How the One-Two Punch of 5G, IoT Pushes Edge Computing

July 3, 2019
IoT market pushed by 5G connection is expected to grow fast and occupy $6.285 billion by 2025, the next shift will be to move users towards edge computing with devices getting stronger and cheaper to produce.
Read More
Load More

Latest

Hands holding smartphone using Google Fi service showing T-Mobile data breach

T-Mobile Data Breach Includes Massive Compromise of Google Fi Service, Unknown Quantity of Customer Records Exposed

Data Privacy’s Tipping Point: Where We Go From Here

Hacker using mobile smartphone calling victim showing remote monitoring and management software used in phishing of federal agencies

Hackers Breached Multiple Federal Agencies via Remote Monitoring and Management Software

Taylor Swift on stage showing bot attack on Ticketmaster

Ticketmaster Says Bot Attack Is To Blame for the Misfortunes of Taylor Swift Fans

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results