Menu

Quick Look: Understanding Cyber Attacks That Leverage the Telephony Channel

Cybercriminals are able to launch new attacks that use the traditionally trusted telephony channel to compromise online accounts. They can use robocalling and caller-id spoofing to craft voice phishing attacks. This session covers the development of a telephony honeypot to understand attacks that leverage the telephony channel and evidence of a variety of attacks, including voice phishing.

Speaker

Headshot

Payas Gupta Research Scientist, New York University Abu Dhabi

← View more Videos

This document was retrieved from https://www.rsaconference.com/videos/quick-look-understanding-cyber-attacks-that-leverage-the-telephony-channel on Fri, 30 Sep 2016 09:28:51 -0400.
© 2016 EMC Corporation. All rights reserved.