Menu

Understanding Cyber Attacks That Leverage the Telephony Channel

  • Thursday, 5 November, 2015 | 10.20 – 11.10 hrs | Level 1 | Room: Etihad Ballroom 1

View all Sessions

Cybercriminals are able to launch new attacks that use the traditionally trusted telephony channel to compromise online accounts. They can use robocalling and caller-id spoofing to craft voice phishing attacks. This session covers the development of a telephony honeypot to understand attacks that leverage the telephony channel and evidence of a variety of attacks, including voice phishing.

Participants

This document was retrieved from http://www.rsaconference.com/events/ad15/agenda/sessions/2207/understanding-cyber-attacks-that-leverage-the on Tue, 17 Jan 2017 18:42:07 -0500.
© 2017 EMC Corporation. All rights reserved.