For service providers, achieving the subscriber communications trifecta is nearly impossible: that is, sending the right message to the right person. Email is a heavily used subscriber communications method, given both its low cost and the ability for subscribers to view the message at their convenience.
For service providers undergoing digital transformation, the importance of subscriber and network protection cannot be understated. When subscribers and networks are at risk of attack or infection, a provider’s digital strategy is weakened and business growth limited.
This story has been told thousands of times before – a botnet is born, a botnet goes down, a botnet tries to get its bots back together. But the story of Necurs is unique.
As communication service providers (CSPs) position their businesses for the digital economy, one significant shift must be prioritized—their investment in personalized, subscriber-centric services. Put another way, a subscriber-first strategy is essential to digital transformation, according to industry experts.
In his latest white paper, “Innovation in Communication Services: Breaking with the Past without Waiting for the Future,” Patrick Donegan of Heavy Reading discusses a key aspect of digital transformation: the ability to offer innovative services that enhance the subscriber experience. More specifically, he discusses the need for personalized services—as well as why DNS technology is an ideal way to achieve personalization in new service offerings.
Last week we launched a new whitepaper by Patrick Donegan of Heavy Reading, titled “Innovation in Communications Services: Breaking with the Past without Waiting for the Future.” The paper discusses a ‘third way’ to service provider digital transformation, utilizing DNS. Read the blog post below for an excerpt from Donegan’s paper, which you can download in its entirety here.
Locky is a new cyberthreat that has received a lot of attention in security circles over the last few months because it has been unusually successful. Locky is advanced ransomware that encrypts a person’s files and holds them for ransom. It uses a number of different technologies to avoid being detected or blocked and takes great care to hide its path back to the attackers. The code is obfuscated to avoid detection by antivirus and malware software. The blackmailers communicate through TOR and only accept Bitcoin as payment, making it nearly impossible to discover who they are.