Understanding Cyber Attacks That Leverage the Telephony Channel

  • Thursday, 5 November, 2015 | 10.20 – 11.10 hrs | Level 1 | Room: Etihad Ballroom 1

View all Sessions

Cybercriminals are able to launch new attacks that use the traditionally trusted telephony channel to compromise online accounts. They can use robocalling and caller-id spoofing to craft voice phishing attacks. This session covers the development of a telephony honeypot to understand attacks that leverage the telephony channel and evidence of a variety of attacks, including voice phishing.


This document was retrieved from on Fri, 24 May 2019 15:02:31 -0400.