Quick Look: Understanding Cyber Attacks That Leverage the Telephony Channel


Posted on in Videos

Cybercriminals are able to launch new attacks that use the traditionally trusted telephony channel to compromise online accounts. They can use robocalling and caller-id spoofing to craft voice phishing attacks. This session covers the development of a telephony honeypot to understand attacks that leverage the telephony channel and evidence of a variety of attacks, including voice phishing.


Share With Your Community