article thumbnail

Do Not Originate (DNO) List: What It Is and Why VoIP Resellers Should Care  

VoIP MS

Traffic Monitoring & Anomaly Detection Keep an eye on your outbound traffic patterns and set up alerts for unusual activity. Implementing network analytics or fraud detection tools can help automatically flag and even shut down suspected fraudulent traffic.

article thumbnail

Top Telecom Fraud Trends in 2025: Evolving Threats & Solutions

Subex Blog

Advanced machine learning (ML) techniques are being deployed by operators to detect unusual call patterns indicative of bypass fraud, but the challenge remains formidable due to the adaptability of fraudsters. Bypass fraud results in substantial financial losses by evading international tariffs and rerouting calls.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NordVPN Launches Scam Call Protection Feature for Android Users in the US

VoIP Review

The Scam Call Protection feature uses a privacy-first approach that looks at call patterns and metadata to spot potential scams without ever touching your actual conversations. Your calls stay private, and the feature runs quietly in the background without needing an active VPN connection.

article thumbnail

SIMBox Fraud: Challenges and AI-Powered Solutions for Telecom Operators

Subex Blog

AI-based geographic filtering can track and block calls with unusual geographic origins, adding an additional layer of defense. Investigation Analysis by AI Agents AI Agents assist fraud analysts by autonomously investigating suspicious call patterns, correlating data from multiple sources, and generating actionable insights.

article thumbnail

Unveiling the Power of AI in Telecom Fraud Detection

Iconxsolutions

Anomaly Detection Systems in Action AI based anomaly detection systems can capture the highly complex informational structure within the data, to be able to learn the numerous call patterns that typically occur. Any calls that appear to deviate from these patterns are flagged as atypical, and can be assessed by an analyst.