Quick Look: Understanding Cyber Attacks That Leverage the Telephony Channel

Cybercriminals are able to launch new attacks that use the traditionally trusted telephony channel to compromise online accounts. They can use robocalling and caller-id spoofing to craft voice phishing attacks. This session covers the development of a telephony honeypot to understand attacks that leverage the telephony channel and evidence of a variety of attacks, including voice phishing.



Payas Gupta Research Scientist, New York University Abu Dhabi

← View more Videos

This document was retrieved from on Wed, 26 Jun 2019 20:12:33 -0400.