Understanding Cyber Attacks That Leverage the Telephony Channel

  • Thursday, 5 November, 2015 | 10.20 – 11.10 hrs | Level 1 | Room: Etihad Ballroom 1

View all Sessions

Cybercriminals are able to launch new attacks that use the traditionally trusted telephony channel to compromise online accounts. They can use robocalling and caller-id spoofing to craft voice phishing attacks. This session covers the development of a telephony honeypot to understand attacks that leverage the telephony channel and evidence of a variety of attacks, including voice phishing.


This document was retrieved from on Sun, 23 Oct 2016 23:24:51 -0400.
© 2016 EMC Corporation. All rights reserved.