<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=168897526784320&amp;ev=PixelInitialized">
WeDo Technologies Blog
Follow Us:

Pokémon Go – who’s responsible for protecting your data from fraud?

By Jorge Borges | Head of Marketing Communications and Demand Generation

The success of Pokémon Go has been unprecedented and inescapable, with Forbes reporting that within four days of the game’s launch it was on course to exceed Twitter’s daily active Android users.

However, the game’s popularity has risked masking serious security concerns. Once downloaded, the Pokémon Go app asks users for a whole host of user permissions to access their contacts, camera, SD card content and, most importantly, GPS location.

Read More

When Planning Your IoT Security Strategy, Don’t Overlook Fraud Management

By Carlos Marques | Head of Product Marketing & Alliances at WeDo Technologies

In an IoT world where everything is being connected to the internet and to each other, it is easier than ever for fraudsters to wreak havoc. One of the risks of the increasing number of connected devices is the rise of IoT botnets.

Botnets are typically comprised of a large group of computers, routers or servers. The computing power of these devices is jointed together, typically without the owners’ knowledge, and remotely controlled by a single ‘botmaster’. The botmaster is often part of a criminal organization that uses the botnets for various types of fraud, including denial of service attacks, which can cripple financial institutions or ecommerce sites, costing businesses millions in losses. Or they can divert traffic to fake webpages and advertising sites, defrauding consumers by stealing their financial and personal information.

Read More

The Future of Almost Everything

By Rui Paiva | Chief Executive Officer at WeDo Technologies

“Every risk poses an opportunity,” stated Patrick Dixon, one of Europe’s leading futurists, in his session “The Future of Almost Everything” at the WeDo Technologies’ 11th annual User Group.  

Read More

OTT Bypass Fraud: Threat or Opportunity?

By Sandra Costa | Product Marketing Specialist for Telecom at WeDo Technologies

In today’s connected world, the way we use technology to communicate is constantly evolving. The availability of fast mobile internet access, together with the increased adoption of smart phones, has created an upsurge of Over-The-Top (OTT) applications (Viber, WhatsApp, Google messenger, Skype, etc.) that provide mobile users with an alternative to the traditional services owned by MNOs (Mobile Network Operators), such as voice, text messaging, multimedia messaging and more.

Read More

Fraud Alert: Exploring SS7 Signaling to Commit Fraud

By Luis Brás | Fraud Consultant at WeDo Technologies

Most of us would be surprised to learn that telephone networks – both mobile and fixed - were never designed to be secure. There are vulnerabilities in networks that allow hackers to read texts, listen to calls and track mobile phone users’ locations. For this reason, mobile operators and fraud management companies fight a never ending battle to minimize the impact of fraud – against themselves and their customers.

Read More

Revenue Assurance at the Digital Crossroads

By Rui Paiva | Chief Executive Officer at WeDo Technologies

“How can we get more buy-in for revenue assurance?” was one of the questions that resounded throughout WeDo Technologies’ 11th annual User Group, and was addressed by WeDo’s own Market Strategist Tony Poulos, in his session on “Revenue Assurance at the Crossroads.”


Read More

Fraud Alert: Roaming Fraud Scheme

By Luis Brás | Fraud Consultant at WeDo Technologies

Mobile fraud is believed to be costing the wireless industry up to $58 billion annually. That is more than 6% of revenue – in an industry with increasingly tight margins.

Fraud comes in all shapes and sizes, and can pop up in the most unlikely places. With the latest interconnect fraud scheme, not only is the subscriber not to blame, they actually are the victims and have no idea that they are being used to perpetuate this type of illicit activity. In a typical instance of this new type of fraud, the interconnect carrier is actually the fraudster.

Read More

Why Energy Suppliers Are Not Football Teams

By Silvia Cardoso | Product Marketing Specialist at WeDo Technologies

Do you know why? Because their customers will change supplier despite the unlikelihood to change their football team even when it loses against the last one in the championship. Nevertheless a lot of the energy customers can handle to be hammered from their suppliers.

Read More

Future Retail Fraud Challenges: Why Building Consumer Trust and Loyalty Is Key to Success

By Joel Pacheco | IT Business Partner at Sonae

In 2005 Continente, the largest retailer in Portugal (owned by Sonae), identified that the opening of new stores alone wouldn’t be enough to grow its customer base. As a result, it was critical for us to invest in customer loyalty to retain and grow the total number of customers. Although we were opening a lot of stores, we were very keen to retain the customers that we already had, rather than just acquire new ones. As the completion grew stronger, it was not only important to increase our knowledge of our customers, but also be able to offer a different and exciting promotional tool that really stood out.  

Read More

Revenue Assurance in Utilities – How to Progress in Maturity

By Pedro Gaspar | Utilities Business Manager at WeDo Technologies

Let’s face the facts: most utility companies today are losing more money that they should, yet it may not be causing concern, especially if... 

Read More

Subscribe WeDo Technologies' Blog

Find a New Way to Monitor Your Telecom Business