IP and Telephony Crime Has Converged – Wake Up, Wise Up & Get Protected!

  • Tuesday, July 22, 2014 | 11.00 – 11.45 hrs | Sands Level 4 | Room: Peony 4501

View all Sessions

Telephones are increasingly used for secondary verification. Cybercriminals know this and are taking over phones alongside PCs to defeat the authentication. What do they do and how do you stop them? This eye opening session uses real world examples to understand how the crime is committed and by who. It then addresses practical solutions to prevent you, or your customers, becoming victims.


This document was retrieved from on Thu, 20 Jun 2019 17:20:44 -0400.