Understanding Cyber Attacks That Leverage the Telephony Channel
|
|
- Ralph Griffin
- 6 years ago
- Views:
Transcription
1 SESSION ID: CCT-R04 Understanding Cyber Attacks That Leverage the Telephony Channel Payas Gupta Research Scientist CRISSP-AD, New York University Abu Dhabi
2 In collaboration with Mustaque Ahamad Pindrop Security Professor at Georgia Institute of Technology Global Professor at New York University Abu Dhabi Former Director, Georgia Tech Information Security Center Provides Solutions to protect enterprise call centers and phone users. 2
3 GLOBAL THREAT
4 Rachel Credit Card Calling, USA 4
5 Wangiri Fraud, Japan 5
6 Tech Support Scam, UK 6
7 Fake Officials Fraud, China 7
8 Etisalat scam, UAE 8
9 UNDERSTANDING TELEPHONY ABUSE
10 Current Data Sources Telcos Crowd sourced FTC, CRTC fraudulent complaint datasets 800notes open datasets Proprietary 10
11 ACT Principles Accuracy Completeness Timeliness 11
12 Accuracy PROBLEMS WITH CURRENT DATA SOURCES
13 Details of Calls 13
14 Perception v/s Reality 14
15 No Actual Timestamps 15
16 Spoofing 16
17 Completeness PROBLEMS WITH CURRENT DATA SOURCES
18 Not all fraudulent calls are reported Compared both FTC and 800notes against each other for a certain set of numbers 18
19 Timeliness PROBLEMS WITH CURRENT DATA SOURCES
20 Delay in Reporting Fraudulent Calls 20
21 HOW TO SETUP ONE?
22 Using SIP Trunk IP Tel. ext Call SIP Trunk Call Manager/ PBX Switch IP Tel. ext Telephone Exchange Rules Destination no. Destination IP Incoming call Incoming call Tel. Range to Incoming call Incoming call Call Manager table IP Tel. ext Honeypot 22
23 VOIP GSM Gateway Direct Call Direct Call Call Forwarding USB Dongle with SIM OR Honeypot SIM Cards The VoIP GSM Gateway 23
24 Phoneytokens Phoneytokens are digital piece of information (phone numbers + features in our case) whose value lies in the unauthorized use of these token. Features Age Profile Sequential Geography 24
25 Phoneytokens 800 toll 800 toll free Miss call service Twitter number Personal Public profiles Facebook comments Call to Twitter feed YouTube comments Apps steal contact details Call and collect info Call Dating sites DNC lists Shady sites Free service Honeypot 25
26 Challenges Anonymously pushing phoneytokens Ability to engage callers Automation Legal: Telephone conversation recording laws Dealing with false positives Cost Ethics 26
27 Progressing in Combating Phone Abuse SUCCESS SO FAR
28 MAAWG 5.2M/275K NDSS Best Paper 2015 Feb Feb RSA MAAWG Abu Dhabi June Nov MAAWG 2.5M/273K MAAWG MAAWG MAAWG 1K/25 2M/50K Honeypot Best Practice The National news 2014 Feb Mar Jun Jul Aug Sep Oct Dec Nomorobo Pindrop Security NCFTA China Eurecom 2013 NYUAD, Gatech, Pindrop Security 28
29 ANALYSIS
30 Case Study on Pindrop s Telephone Honeypot 10 million calls in first 14 months on 277K honeypot numbers What we have seen Telephony Denial of Service Automated Callers Telemarketing Debt Collector Spoofing CNAM Fraud Geo-targeted Attacks 30
31 Initial Results Total Calls 10,591, months Total Sources 1,108,358 Total Destinations 277,817
32 Initial Results Total Calls 10,591,422 Total Sources 1,108, months Total Dirty Destinations 277, ,302
33 Destination Numbers Distribution 100K 5.6K K K 31K 1000K
34 Source Numbers Distribution 1000K 31K 1K K K 31K 1000K
35 Daily Call Volume Labour Day Black Friday Christmas New Year Memorial Day Independence Day Labour Day
36 Hourly Call Volume
37 Age of destination numbers
38 Age based Distribution
39 Geographical Call Distribution 39
40 Attack Patterns
41 Telemarketer 41
42 Penn Credit Debt Collector 42
43 Penn Credit Debt Collector 43
44 Allied Interstate Debt Collector 44
45 Allied Interstate Debt Collector
46 Geo-Targets
47 Geo-Targets
48 Summary Can be used to collect better intelligence about telephony attacks Accurate, complete and timely information can be obtained using telephone honeypots Noticeable calling patterns like telemarketer, debt collectors, spoofing etc. can be observed from the datasets. 48
49 Open Challenges and Questions How many numbers do we need for completeness? Understanding how numbers are chosen/qualified? Sources Destination Threat understanding should enable defense 49
50 APPLY
51 Going Forward Option 1 Get sufficient set of phone numbers Set a phoneypot at your end Help you to distribute phoneytokens Share the data with us Perform analysis and share the intelligence with you Option 2 Get some numbers Forward the calls to those numbers to one of our phoneypots Will share the raw data and intelligence with you 51
Mobile Telephony Threats in Asia
Mobile Telephony Threats in Asia Black Hat Asia 2017, Singapore Dr. Marco Balduzzi Dr. Payas Gupta Lion Gu Sr. Threat Researcher Data Scientist Sr. Threat Researcher Trend Micro Pindrop Trend Micro Joint
More informationFraude dans la Telephonie
Fraude dans la Telephonie Aurélien Francillon Merve Sahin With Monaco Telecom Also with cooperations: NYU Abu Dhabi Georgia Tech Telecom Paris Tech (Marc Relieu) Telephony Fraud A long-standing problem
More informationThe Spoofing/Authentication Threat
The Spoofing/Authentication Threat An Analysis of the Spoofing/Authentication Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Introduction Spoofing refers to the act of intentionally
More informationTELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call Management.
NICC London 8 November 2017 Robert Baker European Managing Director First Orion rbaker@firstorion.com 07983612843 TELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call
More informationWe will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are:
Introduction to Telecom Fraud This guide will help you learn about the different types of telecom fraud and industry best practices for detection and prevention. Three Major Categories of Telecom Fraud
More information10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
More informationCertified Cyber Security Specialist
Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal
More informationISE Cyber Security UCITS Index (HUR)
ISE Cyber Security UCITS Index (HUR) Why Cybersecurity is important Data breaches have become almost commonplace in the last few years Cybersecurity focuses on protecting computers, networks, programs,
More informationMaxincom MWG1000 Series Release Notes. of Version
Maxincom MWG1000 Series Release Notes of Version 3.0.0.36 Table of Contents Maxincom MWG1000 Release Notes of Versions 3.0.0.36... 1 MWG1000 Upgrade Firmware Notice... 3 Release Notes of Version 3.0.0.36...
More informationThis report is based on sampled data. Jun 1 Jul 6 Aug 10 Sep 14 Oct 19 Nov 23 Dec 28 Feb 1 Mar 8 Apr 12 May 17 Ju
0 - Total Traffic Content View Query This report is based on sampled data. Jun 1, 2009 - Jun 25, 2010 Comparing to: Site 300 Unique Pageviews 300 150 150 0 0 Jun 1 Jul 6 Aug 10 Sep 14 Oct 19 Nov 23 Dec
More informationIngate SIParator /Firewall SIP Security for the Enterprise
Ingate SIParator /Firewall SIP Security for the Enterprise Ingate Systems Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?... 3 3
More informationTowards Measuring the Effectiveness of Telephony Blacklists
Towards Measuring the Effectiveness of Telephony Blacklists Sharbani Pandit Georgia Institute of Technology pandit@gatech.edu Roberto Perdisci University of Georgia Georgia Institute of Technology perdisci@cs.uga.edu
More informationUAE PUBLIC TRAINING CALENDAR
UAE 102-R8.3 Primavera P6 Professional Fundamentals Rel 8.3 5 Abu Dhabi 4-Jan 8-Jan 19.5 106-R8.3 Primavera P6 Professional Advanced Rel8.3 3 Dubai 18-Jan 20-Jan 13.0 PMI-SP01 SP) Certification) 5 Abu
More informationCIMA Asia. Interactive Timetable Live Online
CIMA Asia Interactive Timetable 2018 Live Online Information version 8 last updated 04/05/18 Please note information and dates are subject to change. Premium Learning Partner 2018 CIMA Cert BA Course Overview
More informationJordan Levesque Making sure your business is PCI compliant
Jordan Levesque Making sure your business is PCI compliant Brief overview of PCIDSS What's new in PCI DSS 3.2 Why is PCI important? Dive in! Simple things you can do to be secure Tomorrows session: What
More informationThe power of ratings Ross Murray. What the world thinks of Sheffield and how everyone can get the most out of it!
The power of ratings Ross Murray What the world thinks of Sheffield and how everyone can get the most out of it! Agenda o o o o o TripAdvisor Overview UK insights on TripAdvisor Sheffield insights on TripAdvisor
More informationCommunications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise
Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling
More informationThe Scenes of Cyber Crime
Organizer: BRIDGING BARRIERS: LEGAL AND TECHNICAL OF CYBERCRIME CASES The Scenes of Cyber Crime 5 July 2011 Toralv Dirro EMEA Security Strategist, McAfee Labs Low Risk + High Profit -> Crime 500,000 Cyber
More informationRobocall signaling draft-sipcore-callinfo-spam. Henning Schulzrinne IETF 98
Robocall signaling draft-sipcore-callinfo-spam Henning Schulzrinne IETF 98 Background (for the un-stired and un-shaken) Unwanted calls are typically some are illegal, some are just unwanted (by many) example:
More informationTelephony Fraud and Abuse. Merve Sahin
Telephony Fraud and Abuse Merve Sahin sahin@eurecom.fr Background 2 Telephony Networks Quick history 1870s: Plain Old Telephone System (POTS) Enabled by transmission of voice over copper lines Used in-band
More informationSmart Protection Network. Raimund Genes, CTO
Smart Protection Network Raimund Genes, CTO Overwhelmed by Volume of New Threats New unique samples added to AV-Test's malware repository (2000-2010) 20.000.000 18.000.000 16.000.000 14.000.000 12.000.000
More informationCALENDAR FOR THE YEAR 2018
27 Dubai 08-12 Jan 1 Advance Budgeting Workshop 386 Istanbul 11-1 Mar 396 London 13-17 May 2 Advance Business Writing 296 Abu Dhabi 1-19 Jan 3 Contract Management 396 London 22-26 Jan 27 Dubai 18-22 Mar
More informationWE SEE YOUR VOICE. SecureLogix We See Your Voice
ETM SYSTEM WE SEE YOUR VOICE We know some important things about your enterprise things that you may not know yourself. We know that you are significantly overpaying for your corporate voice network and
More informationCybersecurity is a Team Sport
Cybersecurity is a Team Sport Cyber Security Summit at Loyola Marymount University - October 22 2016 Dr. Robert Pittman, CISM Chief Information Security Officer National Cyber Security Awareness Month
More informationSecurity for SIP-based VoIP Communications Solutions
Tomorrow Starts Today Security for SIP-based VoIP Communications Solutions Enterprises and small to medium-sized businesses (SMBs) are exposed to potentially debilitating cyber attacks and exploitation
More informationAccess Control and Physical Security Management. Contents are subject to change. For the latest updates visit
Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure
More informationNuno Pestana, WeDo Technologies
Nuno Pestana, WeDo Technologies SUBSCRIPTION FRAUD SUBSCRIPTION FRAUD In Raid FMS REAL-TIME Subscription Fraud SUBSCRIPTION FRAUD SUBSCRIPTION FRAUD In Raid FMS REAL-TIME Subscription Fraud FRAUD THE IMPACT
More informationIBM. 000-m240. IBM Lotus Sametime Unified Telephony Sales Mastery.
IBM 000-m240 IBM Lotus Sametime Unified Telephony Sales Mastery http://killexams.com/exam-detail/000-m240 Answer: D QUESTION: 23 SUT is designed to work with third party equipment using: A. SIP standards
More informationShaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar
Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar Panelists: Dr. Eric Burger Chief Technology Officer FCC Jim McEachern Principal Technologist ATIS Moderator: Brent Struthers STI-GA
More informationAbout. Established 1 September 2016 Engagement platform for cross-sector interaction and collaboration. Cybersecurity Consortium
Supported by About Established 1 September 2016 Engagement platform for cross-sector interaction and collaboration Industry Academia Cybersecurity Consortium Public Agencies National Cybersecurity R&D
More informationCode of Practice. Mobile Spam. 1.0 February Official Document PPC.01. Security Classification Category (see next page)
Code of Practice Mobile Spam 1.0 February 2006 This is a non-binding permanent reference document of the GSM Association. Security Classification Category (see next page) This is an document. 1.0 Page
More informationAsia Key Economic and Financial Indicators
ASEAN Brunei (BN) Cambodia (KH) Indonesia () Laos (LA) Malaysia () Myanmar (MM) Philippines () Singapore () Thailand () Vietnam () East Asia China (CN) Hong Kong (HK) Japan (JP) South Korea (KR) Taiw an
More informationAsia Key Economic and Financial Indicators
ASEAN Brunei (BN) Cambodia (KH) Indonesia () Laos (LA) Malaysia () Myanmar (MM) Philippines () Singapore () Thailand () Vietnam () East Asia China (CN) Hong Kong (HK) Japan (JP) South Korea (KR) Taiw an
More informationPOSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ)
POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ) ABRIDGED POSTAL AND TELECOMMUNICATIONS SECTOR PERFORMANCE REPORT SECOND QUARTER 2015 Disclaimer: This report has been prepared based
More informationIntellectual Property Constituency (IPC)
Contractual Compliance Intellectual Property Constituency (IPC) Tuesday, 14 October 2014 Agenda Registrar Related Update since ICANN 50 Registry Related Update since ICANN 50 Audit Programs Update Questions
More informationMaintaining Trust: Visa Inc. Payment Security Strategy
Maintaining Trust: Visa Inc Payment Security Strategy Ellen Richey 2010 Payments Conference Chicago Federal Reserve Global Electronic Payments Protecting the payment system is a shared responsibility among
More informationQuick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page
Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security
More informationPrescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC
Prescriptive Security Operations Centers Leveraging big data capabilities to build next generation SOC Cyber Security Industry in constant renewal in 2016 and 2017 1 Tbps Mirai IoT Botnet broke the Internet
More informationFirewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
More informationState of OTT An in-depth look at today s over-the-top content consumption and device usage
State of OTT An in-depth look at today s over-the-top content consumption and device usage Mike Rich VP of Emergent Products Andrew Lipsman SVP of Marketing & Insights For info about the proprietary technology
More informationCIMA Asia. Interactive Timetable Live Online
CIMA Asia Interactive Timetable 2017 2018 Live Online Version 1 Information last updated 09 October 2017 Please note: Information and dates in this timetable are subject to change. CIMA Cert BA Course
More informationJordan Levesque - Keeping your Business Secure
Jordan Levesque - Keeping your Business Secure Review of PCI Benefits of hosting with RCS File Integrity Monitoring Two Factor Log Aggregation Vulnerability Scanning Configuration Management and Continuous
More informationPolice Technical Approach to Cyber Threats
Police Technical Approach to Cyber Threats Jumpei Kawahara Director of High-Tech Crime Technology Division, National Police Agency, Japan 1 Overview (cases) Current Situation 140000 140,000 120000 100000
More informationHarnessing the Power of Visibility
Harnessing the Power of Visibility Isaac Cronkhite VP Enterprise Analytics Great Lakes AIM August, 17 2017 1 Informed Visibility Update 2 What is Informed Visibility? IV is a near real-time enterprise
More informationUS Bancorp Real Time Communications Service Preparedness Part 1
US Bancorp Real Time Communications Service Preparedness Part 1 Doug Carolus Group Manager, Real Time Communications March 19, 2015 US Bancorp who we are Minneapolis-based U.S. Bancorp by the numbers:
More informationICT PROFESSIONAL MICROSOFT OFFICE SCHEDULE MIDRAND
ICT PROFESSIONAL MICROSOFT OFFICE SCHEDULE MIDRAND BYTES PEOPLE SOLUTIONS Bytes Business Park 241 3rd Road Halfway Gardens Midrand Tel: +27 (11) 205-7000 Fax: +27 (11) 205-7110 Email: gauteng.sales@bytes.co.za
More information= SEO Mastery at the Pace of Google
+ = SEO Mastery at the Pace of Google Sarah Bird - CEO of Moz Rumors of my death have been largely exaggerated -- SEO Misinformation: Social drives more traffic than SEO. Misinformation: Bing is growing
More informationTed C. Jones, PhD Chief Economist
Ted C. Jones, PhD Chief Economist Hurricanes U.S. Jobs Jobs (Millions) Seasonally Adjusted 150 145 140 135 130 1.41% Prior 12 Months 2.05 Million Net New Jobs in Past 12-Months 125 '07 '08 '09 '10 '11
More informationHoliday Campaigns That Work 3 billion reasons, 5 proven tips
Holiday Campaigns That Work 3 billion reasons, 5 proven tips Patrick Hansen and Kenan Pollack Senior Interactive Consultants About Us Patrick Hansen Senior Interactive Consultant Eight years experience
More informationUSB Drive Antivirus provides comprehensive protection against any virus, worm trying to attack via USB drive. When an USB device is inserted into
USB Drive Antivirus provides comprehensive protection against any virus, worm trying to attack via USB drive. When an USB device is inserted into your computer, This crypto-mining Android malware is so
More informationHIGH RISK REPORT J.CREW GROUP, INC. September 14, 2017
HIGH RISK REPORT J.CREW GROUP, INC. September 14, 2017 CreditRiskMonitor s assessment of J.Crew Group, Inc. s ( JCG ) high risk status has been determined by a combination of factors: Monthly Average FRISK
More informationUnified Communications Manager Express Toll Fraud Prevention
Unified Communications Manager Express Toll Fraud Prevention Document ID: 107626 Contents Introduction Prerequisites Requirements Components Used Conventions Overview Internal vs. External Threats Toll
More informationROHIT WANCHOO 1333, South Park Street, Apt 803, Halifax, NS B3J2K9 M:
ROHIT WANCHOO 1333, South Park Street, Apt 803, Halifax, NS B3J2K9 M: +19024412385 mailme@rohitwanchoo.com Professional Summary Goal-oriented Senior System Engineer with an experience of 8 years dedicated
More informationReal Estate Forecast 2015
Real Estate Forecast 2015 No Place But Up Interest Rates Rents Prices Real Estate and the Economy Ted C. Jones, PhD Chief Economist Stewart Title Guaranty Company Thank Heavens for Global Warming Think
More informationBuilding a Cybersecurity R&D Ecosystem in Singapore
Building a Cybersecurity R&D Ecosystem in Singapore Vivy Suhendra Executive Director, Singapore Cybersecurity Consortium About Us Launched 1 Sep 2016, funded by National Research Foundation (NRF) and anchored
More informationEBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS
EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS HOW SECURE IS YOUR VPN ACCESS? Remote access gateways such as VPNs and firewalls provide critical anywhere-anytime connections to the networks
More informationYour Future with Worldpay. Shane Happach Managing Director, Worldpay ecom
Your Future with Worldpay Shane Happach Managing Director, Worldpay ecom Leaders in modern money 2 Worldpay 2016. All rights reserved. In 2015 Transactions a day Processed 3 Worldpay 2016. All rights reserved.
More informationSME License Order Working Group Update - Webinar #3 Call in number:
SME License Order Working Group Update - Webinar #3 Call in number: Canada Local: +1-416-915-8942 Canada Toll Free: +1-855-244-8680 Event Number: 662 298 966 Attendee ID: check your WebEx session under
More informationNOT PROTECTIVELY MARKED PHISHING. July 2016
- PHISHING July 2016 1 Introduction: The purpose of this document is to provide an analysis of the most prevalent trends and characteristics of phishing campaigns in the UK in July 2016. The analysis is
More informationPreempting Cyber Fraud: SWIFT Threat Indicator Sharing Tool. Cyber Security 3.0 Better Together August 18, 2017
Preempting Cyber Fraud: SWIFT Threat Indicator Sharing Tool Cyber Security 3.0 Better Together August 18, 2017 Research Overview Problem Statement Research Goals & Methodology Defining Insider Cashout
More informationEuropean Emergency Response Services
article European Emergency Response Services for the All-IP Present and Future By Hugh Goldstein, VP Strategic Alliance, Voxbone Voxbone US LLC - San Francisco Office 535 Voxbone Mission US St San 535
More informationSIP Trunking & Security. Dan York, CISSP VOIPSA Best Practices Chair
SIP Trunking & Security Dan York, CISSP VOIPSA Best Practices Chair September 2, 2009 Privacy Availability Compliance Confidence Mobility Cost Avoidance Business Continuity TDM security is relatively
More informationThe Telephony Denial of Service (TDoS) Threat
The Telephony Denial of Service (TDoS) Threat An Analysis of the TDoS Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Telephony Denial-of-Service (TDoS) and The Public Voice
More informationDoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action
DoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action 1 Table of Content Preamble...3 About Radware s DefensePro... 3 About Radware s Emergency Response
More informationIntroducing Survey123 For ArcGIS
FedGIS Conference February 24 25, 2016 Washington, DC Introducing Survey123 For ArcGIS James Tedrick, Esri Jawameer Kakakhan, UN OCHA Configurable Solutions That Work Together Vizualize Collect Navigator
More informationCisco Unified SRST and Cisco Unified SIP SRST Command Reference (All Versions)
Cisco Unified SRST and Cisco Unified SIP SRST Command Reference (All Versions) Last Modified: 2017-11-30 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
More informationI Know Where You are and What You are Sharing
I Know Where You are and What You are Sharing Exploiting P2P Communications to Invade Users Privacy Stevens Le Blond, Chao Zhang, Arnaud Legout, Keith Ross, Walid Babbous CS558 Presentation Natasa Ntagianta
More informationJanuary 14, Advanced Methods To Target and Eliminate Unlawful Robocalls, WC Docket No
Amanda E. Potter AT&T Services, Inc. Assistant Vice President- 1120 20th Street, NW Senior Legal Counsel Suite 1000 Washington, DC 20036 Phone: 202.457.2103 E-mail: amanda.potter@att.com January 14, 2019
More information2
May 2016 1 2 3 4 5 A. Consumer Confidence Index (CCI) - Consumer Confidence Index (CCI) - Current Economic Condition Index (CECI) - Consumer Expectation Index (CEI) Current Economic Condition Index - Current
More informationBlueWater Software Constant Innovation by Orca Wave
BlueWater Software Constant Innovation by Orca Wave Overview: Revenue assurance, cost management and delivering key and timely information to BlueWater Users; are operational pillars of our BlueWater software
More informationData Transfers in the Grid: Workload Analysis of Globus GridFTP
Data Transfers in the Grid: Workload Analysis of Globus GridFTP Nicolas Kourtellis, Lydia Prieto, Gustavo Zarrate, Adriana Iamnitchi University of South Florida Dan Fraser Argonne National Laboratory Objective
More informationDecision Making Information from Your Mobile Device with Today's Rockwell Software
Decision Making Information from Your Mobile Device with Today's Rockwell Software PUBLIC Rockwell Automation TechED 2016 @ROKTechED #ROKTechED Copyright 2016 Rockwell Automation, Inc. All Rights Reserved.
More information2
March 2016 1 2 3 4 5 A. Consumer Confidence Index (CCI) - Consumer Confidence Index (CCI) - Current Economic Condition Index (CECI) - Consumer Expectation Index (CEI) Current Economic Condition Index -
More informationReal-time Communications Security and SDN
Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,
More informationCouncil, 8 February 2017 Information Technology Report Executive summary and recommendations
Council, 8 February 2017 Information Technology Report Executive summary and recommendations Introduction This report provides the Council with an update into the work of the Information Technology Directorate
More information2
February 2015 1 2 3 4 5 A. Consumer Confidence Index (CCI) - Consumer Confidence Index (CCI) - Current Economic Condition Index (CECI) - Consumer Expectation Index (CEI) Current Economic Condition Index
More informationAPWG Global Phishing Survey 2H2010
APWG Global Phishing Survey 2H2010 Rod Rasmussen Greg Aaron June 21, 2011 Goals Study domain names and URLs to: Provide a consistent benchmark for scope of phishing problems worldwide Understand what phishers
More informationEvery product has a story. Let ScanLife tell it.
Every product has a story. Let ScanLife tell it. Think of ScanLife as the get more button. And you decide what happens when they press it. Go to website Save a contact Initiate a call Send an SMS Send
More informationUnderstanding Cisco Unified Communications Security
Cisco Support Community Presents Tech-Talk Series Understanding Cisco Unified Communications Security Akhil Behl Solutions Architect, akbehl@cisco.com Author of Securing Cisco IP Telephony Networks 2010
More informationJune 2, If you have questions, please do not hesitate to contact me at (517) Sincerely,
RICK SNYDER GOVERNOR STATE OF MICHIGAN DEPARTMENT OF LICENSING AND REGULATORY AFFAIRS PUBLIC SERVICE COMMISSION GREG R. WHITE JOHN D. QUACKENBUSH SALLY A. TALBERG COMMISSIONER CHAIRMAN COMMISSIONER MIKE
More informationREPORT. Year In Review. proofpoint.com
REPORT Year In Review proofpoint.com Email fraud, also known as business email compromise (BEC), is one of today s greatest cyber threats. These socially engineered attacks seek to exploit people rather
More informationUnderstanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution
Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution Bharat Srinivasan 1, Payas Gupta 2, Manos Antonakakis 1, and Mustaque Ahamad 1,2 1 Georgia Institute of Technology, Atlanta,
More informationWho We Are! Natalie Timpone
Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who
More informationThe Power of Prediction: Cloud Bandwidth and Cost Reduction
The Power of Prediction: Cloud Bandwidth and Cost Reduction Eyal Zohar Israel Cidon Technion Osnat(Ossi) Mokryn Tel-Aviv College Traffic Redundancy Elimination (TRE) Traffic redundancy stems from downloading
More informationBank of america report phishing
Search Search pages & people Search Search Search pages & people Search Bank of america report phishing email We recently discovered a new phishing scam from a Bank of America spam email some reports that
More informationNew Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks
New Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks 1 WOULD YOU OPEN THIS ATTACHMENT? Over 90% of targeted emails use malicious file attachments as the payload or infection source
More informationVodafone Global FACTS
Vodafone Global FACTS Stefanie Schmidt, Stefan Deckers July 2018 C1-Vodafone External C1-Vodafone External 2 Global FACTS Overview & Introduction Luxembourg Global Roamer Germany 23 Countries Overview
More informationDMARC Continuing to enable trust between brand owners and receivers
DMARC Continuing to enable trust between brand owners and receivers February 2014 1 DMARC Defined DMARC stands for: Domain-based Message Authentication, Reporting & Conformance (pronounced dee-mark ) 2
More informationLarry Kreger Jr. Credit Analyst Farm Credit West
Larry Kreger Jr. Credit Analyst Farm Credit West Cash Receipts by Sector $5,000,000,000 $4,500,000,000 $4,000,000,000 $3,500,000,000 $3,000,000,000 $2,500,000,000 $2,000,000,000 $1,500,000,000 $1,000,000,000
More informationJune 2012 First Data PCI RAPID COMPLY SM Solution
June 2012 First Data PCI RAPID COMPLY SM Solution You don t have to be a security expert to be compliant. Developer: 06 Rev: 05/03/2012 V: 1.0 Agenda Research Background Product Overview Steps to becoming
More informationNigerian Telecommunications (Services) Sector Report Q3 2016
Nigerian Telecommunications (Services) Sector Report Q3 2016 24 NOVEMBER 2016 Telecommunications Data The telecommunications data used in this report were obtained from the National Bureau of Statistics
More informationAIL Framework for Analysis of Information Leaks From a CSIRT use-case towards a generic analysis open source software
AIL Framework for Analysis of Information Leaks From a CSIRT use-case towards a generic analysis open source software Team CIRCL - TLP:WHITE info@circl.lu FIRST 2017 Leaks and CSIRT day-to-day operations
More informationBest Practices in Public Information Management in Sri Lanka. Presented by Nimal Athukorala D.C. Dissanayake
Best Practices in Public Information Management in Sri Lanka Presented by Nimal Athukorala D.C. Dissanayake Content Objectives Method of Information Management Case Study- GIC Call Center GIC Web Portal
More informationHPE Security Data Security. HPE SecureData. Product Lifecycle Status. End of Support Dates. Date: April 20, 2017 Version:
HPE Security Data Security HPE SecureData Product Lifecycle Status End of Support Dates Date: April 20, 2017 Version: 1704-1 Table of Contents Table of Contents... 2 Introduction... 3 HPE SecureData Appliance...
More informationModern IP Communication bears risks
Modern IP Communication bears risks How to protect your business telephony from cyber attacks Voice-over-IP (VoIP) provides many new features over PSTN. However, the interconnection with your IT infrastructure
More informationspam goes mobile Comverse User Forum 29th June 2005, Marbella (Spain)
spam goes mobile Comverse User Forum 29th June 2005, Marbella (Spain) Lara Srivastava Project Director- ITU New Initiatives Programme Strategy and Policy Unit, ITU Note: The views expressed in this presentation
More informationAsks for clarification of whether a GOP must communicate to a TOP that a generator is in manual mode (no AVR) during start up or shut down.
# Name Duration 1 Project 2011-INT-02 Interpretation of VAR-002 for Constellation Power Gen 185 days Jan Feb Mar Apr May Jun Jul Aug Sep O 2012 2 Start Date for this Plan 0 days 3 A - ASSEMBLE SDT 6 days
More informationThis tutorial is designed for those who would like to understand the basics of i-mode in simple and easy steps.
About the Tutorial NTT DoCoMo's i-mode is a mobile internet service popular in Japan. i-mode was invented by a team led by Mari Matsunaga in February 1999 at NTT DoCoMo. This tutorial explains the basic
More informationOptimizing Field Operations. Jeff Shaner
Optimizing Field Operations Jeff Shaner Field GIS Taking GIS Beyond the Office Collecting Data Reporting Observations Managing Work Connecting the Field with the Enterprise Workforce for ArcGIS Field workforce
More informationFederal Trade Commission Protecting Consumer Privacy. J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission
Federal Trade Commission Protecting Consumer Privacy J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission FTC s Approach to Privacy Consumers are concerned about consequences
More information