Cyber Security

1.77 Crore Mobile Connections Deactivated Due to Fake Documentation
Regulatory

1.77 Crore Mobile Connections Deactivated Due to Fake Documentation

The Department of Telecommunications (DoT), in partnership with Telecom Service Providers (TSPs), has disconnected 1.77 crore mobile connections issued using fake or forged documents. Additionally, 33.48 lakh mobile connections and 49,930 mobile handsets used by cybercriminals in high-risk areas have been deactivated.  To prevent misuse, 77.61 lakh mobile connections exceeding individual limits were disconnected, and […]

Read More
Understanding the Unique Data Security Challenges in the Telecommunications Industry
Informative Top Reads

Understanding the Unique Data Security Challenges in the Telecommunications Industry

The recent AT&T data breach revealed a critical vulnerability in data security: even data that appears anonymized can be compromised when combined with other datasets. This incident underscores a systemic challenge for telecom companies—managing vast amounts of sensitive data across complex, fragmented systems while defending against advanced cyber threats.  As one of the industries that […]

Read More
Ratan Tata's Comapny Tata Communication Joint Hands with Palo Alto Networks to Enhance Cuber Security
Worldwide Innovation

Ratan Tata’s Company Tata Communications Joint Hands with Palo Alto Networks to Enhance Cyber Security

Tata Communications has announced a strategic partnership with global cybersecurity leader Palo Alto Networks to provide advanced cybersecurity solutions for enterprises worldwide. This collaboration combines Palo Alto Networks’ cutting-edge technologies with Tata Communications’ expertise in network security, cloud security, and cyberthreat management, offering a comprehensive suite of cybersecurity services.  With the rapid shift towards digital […]

Read More
Informative

What Is Smishing? Know How it Works & Preventive Measures

“Smishing” is a cybersecurity term that combines “SMS” with “phishing,” referring to a type of cyberattack where attackers use text messages to trick individuals into divulging sensitive information or performing certain actions. Similar to email phishing, smishing attempts to exploit human vulnerabilities to gain unauthorized access to personal information, financial accounts, or sensitive data.   Here’s […]

Read More
Broadband

BSNL Landline User Data Exposed and Sold on Dark Web 

Telecom operator BSNL has fallen victim to a data breach, with reports indicating that hackers are selling the stolen data of thousands of BSNL internet and landline users on the dark web.  A significant issue has been reported involving a hacker, identified as “Perell,” on the dark web, who claims to have acquired critical information […]

Read More
Telecom Industry

Safeguarding Telecom Networks: Plans Underway for a Dedicated Cybersecurity Agency 

The government is gearing up to establish a national cybersecurity agency to ensure the safety of telecommunication networks and services, according to a senior official. Speaking anonymously, the official acknowledged the escalating frequency of cyberattacks in recent years and stressed the necessity of securing critical infrastructure. Although the timeline and specifics are yet to be […]

Read More