Understanding Cyber Attacks That Leverage the Telephony Channel

Size: px
Start display at page:

Download "Understanding Cyber Attacks That Leverage the Telephony Channel"

Transcription

1 SESSION ID: CCT-R04 Understanding Cyber Attacks That Leverage the Telephony Channel Payas Gupta Research Scientist CRISSP-AD, New York University Abu Dhabi

2 In collaboration with Mustaque Ahamad Pindrop Security Professor at Georgia Institute of Technology Global Professor at New York University Abu Dhabi Former Director, Georgia Tech Information Security Center Provides Solutions to protect enterprise call centers and phone users. 2

3 GLOBAL THREAT

4 Rachel Credit Card Calling, USA 4

5 Wangiri Fraud, Japan 5

6 Tech Support Scam, UK 6

7 Fake Officials Fraud, China 7

8 Etisalat scam, UAE 8

9 UNDERSTANDING TELEPHONY ABUSE

10 Current Data Sources Telcos Crowd sourced FTC, CRTC fraudulent complaint datasets 800notes open datasets Proprietary 10

11 ACT Principles Accuracy Completeness Timeliness 11

12 Accuracy PROBLEMS WITH CURRENT DATA SOURCES

13 Details of Calls 13

14 Perception v/s Reality 14

15 No Actual Timestamps 15

16 Spoofing 16

17 Completeness PROBLEMS WITH CURRENT DATA SOURCES

18 Not all fraudulent calls are reported Compared both FTC and 800notes against each other for a certain set of numbers 18

19 Timeliness PROBLEMS WITH CURRENT DATA SOURCES

20 Delay in Reporting Fraudulent Calls 20

21 HOW TO SETUP ONE?

22 Using SIP Trunk IP Tel. ext Call SIP Trunk Call Manager/ PBX Switch IP Tel. ext Telephone Exchange Rules Destination no. Destination IP Incoming call Incoming call Tel. Range to Incoming call Incoming call Call Manager table IP Tel. ext Honeypot 22

23 VOIP GSM Gateway Direct Call Direct Call Call Forwarding USB Dongle with SIM OR Honeypot SIM Cards The VoIP GSM Gateway 23

24 Phoneytokens Phoneytokens are digital piece of information (phone numbers + features in our case) whose value lies in the unauthorized use of these token. Features Age Profile Sequential Geography 24

25 Phoneytokens 800 toll 800 toll free Miss call service Twitter number Personal Public profiles Facebook comments Call to Twitter feed YouTube comments Apps steal contact details Call and collect info Call Dating sites DNC lists Shady sites Free service Honeypot 25

26 Challenges Anonymously pushing phoneytokens Ability to engage callers Automation Legal: Telephone conversation recording laws Dealing with false positives Cost Ethics 26

27 Progressing in Combating Phone Abuse SUCCESS SO FAR

28 MAAWG 5.2M/275K NDSS Best Paper 2015 Feb Feb RSA MAAWG Abu Dhabi June Nov MAAWG 2.5M/273K MAAWG MAAWG MAAWG 1K/25 2M/50K Honeypot Best Practice The National news 2014 Feb Mar Jun Jul Aug Sep Oct Dec Nomorobo Pindrop Security NCFTA China Eurecom 2013 NYUAD, Gatech, Pindrop Security 28

29 ANALYSIS

30 Case Study on Pindrop s Telephone Honeypot 10 million calls in first 14 months on 277K honeypot numbers What we have seen Telephony Denial of Service Automated Callers Telemarketing Debt Collector Spoofing CNAM Fraud Geo-targeted Attacks 30

31 Initial Results Total Calls 10,591, months Total Sources 1,108,358 Total Destinations 277,817

32 Initial Results Total Calls 10,591,422 Total Sources 1,108, months Total Dirty Destinations 277, ,302

33 Destination Numbers Distribution 100K 5.6K K K 31K 1000K

34 Source Numbers Distribution 1000K 31K 1K K K 31K 1000K

35 Daily Call Volume Labour Day Black Friday Christmas New Year Memorial Day Independence Day Labour Day

36 Hourly Call Volume

37 Age of destination numbers

38 Age based Distribution

39 Geographical Call Distribution 39

40 Attack Patterns

41 Telemarketer 41

42 Penn Credit Debt Collector 42

43 Penn Credit Debt Collector 43

44 Allied Interstate Debt Collector 44

45 Allied Interstate Debt Collector

46 Geo-Targets

47 Geo-Targets

48 Summary Can be used to collect better intelligence about telephony attacks Accurate, complete and timely information can be obtained using telephone honeypots Noticeable calling patterns like telemarketer, debt collectors, spoofing etc. can be observed from the datasets. 48

49 Open Challenges and Questions How many numbers do we need for completeness? Understanding how numbers are chosen/qualified? Sources Destination Threat understanding should enable defense 49

50 APPLY

51 Going Forward Option 1 Get sufficient set of phone numbers Set a phoneypot at your end Help you to distribute phoneytokens Share the data with us Perform analysis and share the intelligence with you Option 2 Get some numbers Forward the calls to those numbers to one of our phoneypots Will share the raw data and intelligence with you 51

Mobile Telephony Threats in Asia

Mobile Telephony Threats in Asia Mobile Telephony Threats in Asia Black Hat Asia 2017, Singapore Dr. Marco Balduzzi Dr. Payas Gupta Lion Gu Sr. Threat Researcher Data Scientist Sr. Threat Researcher Trend Micro Pindrop Trend Micro Joint

More information

Fraude dans la Telephonie

Fraude dans la Telephonie Fraude dans la Telephonie Aurélien Francillon Merve Sahin With Monaco Telecom Also with cooperations: NYU Abu Dhabi Georgia Tech Telecom Paris Tech (Marc Relieu) Telephony Fraud A long-standing problem

More information

The Spoofing/Authentication Threat

The Spoofing/Authentication Threat The Spoofing/Authentication Threat An Analysis of the Spoofing/Authentication Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Introduction Spoofing refers to the act of intentionally

More information

TELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call Management.

TELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call Management. NICC London 8 November 2017 Robert Baker European Managing Director First Orion rbaker@firstorion.com 07983612843 TELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call

More information

We will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are:

We will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are: Introduction to Telecom Fraud This guide will help you learn about the different types of telecom fraud and industry best practices for detection and prevention. Three Major Categories of Telecom Fraud

More information

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network 10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity

More information

Certified Cyber Security Specialist

Certified Cyber Security Specialist Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal

More information

ISE Cyber Security UCITS Index (HUR)

ISE Cyber Security UCITS Index (HUR) ISE Cyber Security UCITS Index (HUR) Why Cybersecurity is important Data breaches have become almost commonplace in the last few years Cybersecurity focuses on protecting computers, networks, programs,

More information

Maxincom MWG1000 Series Release Notes. of Version

Maxincom MWG1000 Series Release Notes. of Version Maxincom MWG1000 Series Release Notes of Version 3.0.0.36 Table of Contents Maxincom MWG1000 Release Notes of Versions 3.0.0.36... 1 MWG1000 Upgrade Firmware Notice... 3 Release Notes of Version 3.0.0.36...

More information

This report is based on sampled data. Jun 1 Jul 6 Aug 10 Sep 14 Oct 19 Nov 23 Dec 28 Feb 1 Mar 8 Apr 12 May 17 Ju

This report is based on sampled data. Jun 1 Jul 6 Aug 10 Sep 14 Oct 19 Nov 23 Dec 28 Feb 1 Mar 8 Apr 12 May 17 Ju 0 - Total Traffic Content View Query This report is based on sampled data. Jun 1, 2009 - Jun 25, 2010 Comparing to: Site 300 Unique Pageviews 300 150 150 0 0 Jun 1 Jul 6 Aug 10 Sep 14 Oct 19 Nov 23 Dec

More information

Ingate SIParator /Firewall SIP Security for the Enterprise

Ingate SIParator /Firewall SIP Security for the Enterprise Ingate SIParator /Firewall SIP Security for the Enterprise Ingate Systems Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?... 3 3

More information

Towards Measuring the Effectiveness of Telephony Blacklists

Towards Measuring the Effectiveness of Telephony Blacklists Towards Measuring the Effectiveness of Telephony Blacklists Sharbani Pandit Georgia Institute of Technology pandit@gatech.edu Roberto Perdisci University of Georgia Georgia Institute of Technology perdisci@cs.uga.edu

More information

UAE PUBLIC TRAINING CALENDAR

UAE PUBLIC TRAINING CALENDAR UAE 102-R8.3 Primavera P6 Professional Fundamentals Rel 8.3 5 Abu Dhabi 4-Jan 8-Jan 19.5 106-R8.3 Primavera P6 Professional Advanced Rel8.3 3 Dubai 18-Jan 20-Jan 13.0 PMI-SP01 SP) Certification) 5 Abu

More information

CIMA Asia. Interactive Timetable Live Online

CIMA Asia. Interactive Timetable Live Online CIMA Asia Interactive Timetable 2018 Live Online Information version 8 last updated 04/05/18 Please note information and dates are subject to change. Premium Learning Partner 2018 CIMA Cert BA Course Overview

More information

Jordan Levesque Making sure your business is PCI compliant

Jordan Levesque Making sure your business is PCI compliant Jordan Levesque Making sure your business is PCI compliant Brief overview of PCIDSS What's new in PCI DSS 3.2 Why is PCI important? Dive in! Simple things you can do to be secure Tomorrows session: What

More information

The power of ratings Ross Murray. What the world thinks of Sheffield and how everyone can get the most out of it!

The power of ratings Ross Murray. What the world thinks of Sheffield and how everyone can get the most out of it! The power of ratings Ross Murray What the world thinks of Sheffield and how everyone can get the most out of it! Agenda o o o o o TripAdvisor Overview UK insights on TripAdvisor Sheffield insights on TripAdvisor

More information

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling

More information

The Scenes of Cyber Crime

The Scenes of Cyber Crime Organizer: BRIDGING BARRIERS: LEGAL AND TECHNICAL OF CYBERCRIME CASES The Scenes of Cyber Crime 5 July 2011 Toralv Dirro EMEA Security Strategist, McAfee Labs Low Risk + High Profit -> Crime 500,000 Cyber

More information

Robocall signaling draft-sipcore-callinfo-spam. Henning Schulzrinne IETF 98

Robocall signaling draft-sipcore-callinfo-spam. Henning Schulzrinne IETF 98 Robocall signaling draft-sipcore-callinfo-spam Henning Schulzrinne IETF 98 Background (for the un-stired and un-shaken) Unwanted calls are typically some are illegal, some are just unwanted (by many) example:

More information

Telephony Fraud and Abuse. Merve Sahin

Telephony Fraud and Abuse. Merve Sahin Telephony Fraud and Abuse Merve Sahin sahin@eurecom.fr Background 2 Telephony Networks Quick history 1870s: Plain Old Telephone System (POTS) Enabled by transmission of voice over copper lines Used in-band

More information

Smart Protection Network. Raimund Genes, CTO

Smart Protection Network. Raimund Genes, CTO Smart Protection Network Raimund Genes, CTO Overwhelmed by Volume of New Threats New unique samples added to AV-Test's malware repository (2000-2010) 20.000.000 18.000.000 16.000.000 14.000.000 12.000.000

More information

CALENDAR FOR THE YEAR 2018

CALENDAR FOR THE YEAR 2018 27 Dubai 08-12 Jan 1 Advance Budgeting Workshop 386 Istanbul 11-1 Mar 396 London 13-17 May 2 Advance Business Writing 296 Abu Dhabi 1-19 Jan 3 Contract Management 396 London 22-26 Jan 27 Dubai 18-22 Mar

More information

WE SEE YOUR VOICE. SecureLogix We See Your Voice

WE SEE YOUR VOICE. SecureLogix We See Your Voice ETM SYSTEM WE SEE YOUR VOICE We know some important things about your enterprise things that you may not know yourself. We know that you are significantly overpaying for your corporate voice network and

More information

Cybersecurity is a Team Sport

Cybersecurity is a Team Sport Cybersecurity is a Team Sport Cyber Security Summit at Loyola Marymount University - October 22 2016 Dr. Robert Pittman, CISM Chief Information Security Officer National Cyber Security Awareness Month

More information

Security for SIP-based VoIP Communications Solutions

Security for SIP-based VoIP Communications Solutions Tomorrow Starts Today Security for SIP-based VoIP Communications Solutions Enterprises and small to medium-sized businesses (SMBs) are exposed to potentially debilitating cyber attacks and exploitation

More information

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit

Access Control and Physical Security Management. Contents are subject to change. For the latest updates visit Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure

More information

Nuno Pestana, WeDo Technologies

Nuno Pestana, WeDo Technologies Nuno Pestana, WeDo Technologies SUBSCRIPTION FRAUD SUBSCRIPTION FRAUD In Raid FMS REAL-TIME Subscription Fraud SUBSCRIPTION FRAUD SUBSCRIPTION FRAUD In Raid FMS REAL-TIME Subscription Fraud FRAUD THE IMPACT

More information

IBM. 000-m240. IBM Lotus Sametime Unified Telephony Sales Mastery.

IBM. 000-m240. IBM Lotus Sametime Unified Telephony Sales Mastery. IBM 000-m240 IBM Lotus Sametime Unified Telephony Sales Mastery http://killexams.com/exam-detail/000-m240 Answer: D QUESTION: 23 SUT is designed to work with third party equipment using: A. SIP standards

More information

Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar

Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar Panelists: Dr. Eric Burger Chief Technology Officer FCC Jim McEachern Principal Technologist ATIS Moderator: Brent Struthers STI-GA

More information

About. Established 1 September 2016 Engagement platform for cross-sector interaction and collaboration. Cybersecurity Consortium

About. Established 1 September 2016 Engagement platform for cross-sector interaction and collaboration. Cybersecurity Consortium Supported by About Established 1 September 2016 Engagement platform for cross-sector interaction and collaboration Industry Academia Cybersecurity Consortium Public Agencies National Cybersecurity R&D

More information

Code of Practice. Mobile Spam. 1.0 February Official Document PPC.01. Security Classification Category (see next page)

Code of Practice. Mobile Spam. 1.0 February Official Document PPC.01. Security Classification Category (see next page) Code of Practice Mobile Spam 1.0 February 2006 This is a non-binding permanent reference document of the GSM Association. Security Classification Category (see next page) This is an document. 1.0 Page

More information

Asia Key Economic and Financial Indicators

Asia Key Economic and Financial Indicators ASEAN Brunei (BN) Cambodia (KH) Indonesia () Laos (LA) Malaysia () Myanmar (MM) Philippines () Singapore () Thailand () Vietnam () East Asia China (CN) Hong Kong (HK) Japan (JP) South Korea (KR) Taiw an

More information

Asia Key Economic and Financial Indicators

Asia Key Economic and Financial Indicators ASEAN Brunei (BN) Cambodia (KH) Indonesia () Laos (LA) Malaysia () Myanmar (MM) Philippines () Singapore () Thailand () Vietnam () East Asia China (CN) Hong Kong (HK) Japan (JP) South Korea (KR) Taiw an

More information

POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ)

POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ) POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ) ABRIDGED POSTAL AND TELECOMMUNICATIONS SECTOR PERFORMANCE REPORT SECOND QUARTER 2015 Disclaimer: This report has been prepared based

More information

Intellectual Property Constituency (IPC)

Intellectual Property Constituency (IPC) Contractual Compliance Intellectual Property Constituency (IPC) Tuesday, 14 October 2014 Agenda Registrar Related Update since ICANN 50 Registry Related Update since ICANN 50 Audit Programs Update Questions

More information

Maintaining Trust: Visa Inc. Payment Security Strategy

Maintaining Trust: Visa Inc. Payment Security Strategy Maintaining Trust: Visa Inc Payment Security Strategy Ellen Richey 2010 Payments Conference Chicago Federal Reserve Global Electronic Payments Protecting the payment system is a shared responsibility among

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC Prescriptive Security Operations Centers Leveraging big data capabilities to build next generation SOC Cyber Security Industry in constant renewal in 2016 and 2017 1 Tbps Mirai IoT Botnet broke the Internet

More information

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice

More information

State of OTT An in-depth look at today s over-the-top content consumption and device usage

State of OTT An in-depth look at today s over-the-top content consumption and device usage State of OTT An in-depth look at today s over-the-top content consumption and device usage Mike Rich VP of Emergent Products Andrew Lipsman SVP of Marketing & Insights For info about the proprietary technology

More information

CIMA Asia. Interactive Timetable Live Online

CIMA Asia. Interactive Timetable Live Online CIMA Asia Interactive Timetable 2017 2018 Live Online Version 1 Information last updated 09 October 2017 Please note: Information and dates in this timetable are subject to change. CIMA Cert BA Course

More information

Jordan Levesque - Keeping your Business Secure

Jordan Levesque - Keeping your Business Secure Jordan Levesque - Keeping your Business Secure Review of PCI Benefits of hosting with RCS File Integrity Monitoring Two Factor Log Aggregation Vulnerability Scanning Configuration Management and Continuous

More information

Police Technical Approach to Cyber Threats

Police Technical Approach to Cyber Threats Police Technical Approach to Cyber Threats Jumpei Kawahara Director of High-Tech Crime Technology Division, National Police Agency, Japan 1 Overview (cases) Current Situation 140000 140,000 120000 100000

More information

Harnessing the Power of Visibility

Harnessing the Power of Visibility Harnessing the Power of Visibility Isaac Cronkhite VP Enterprise Analytics Great Lakes AIM August, 17 2017 1 Informed Visibility Update 2 What is Informed Visibility? IV is a near real-time enterprise

More information

US Bancorp Real Time Communications Service Preparedness Part 1

US Bancorp Real Time Communications Service Preparedness Part 1 US Bancorp Real Time Communications Service Preparedness Part 1 Doug Carolus Group Manager, Real Time Communications March 19, 2015 US Bancorp who we are Minneapolis-based U.S. Bancorp by the numbers:

More information

ICT PROFESSIONAL MICROSOFT OFFICE SCHEDULE MIDRAND

ICT PROFESSIONAL MICROSOFT OFFICE SCHEDULE MIDRAND ICT PROFESSIONAL MICROSOFT OFFICE SCHEDULE MIDRAND BYTES PEOPLE SOLUTIONS Bytes Business Park 241 3rd Road Halfway Gardens Midrand Tel: +27 (11) 205-7000 Fax: +27 (11) 205-7110 Email: gauteng.sales@bytes.co.za

More information

= SEO Mastery at the Pace of Google

= SEO Mastery at the Pace of Google + = SEO Mastery at the Pace of Google Sarah Bird - CEO of Moz Rumors of my death have been largely exaggerated -- SEO Misinformation: Social drives more traffic than SEO. Misinformation: Bing is growing

More information

Ted C. Jones, PhD Chief Economist

Ted C. Jones, PhD Chief Economist Ted C. Jones, PhD Chief Economist Hurricanes U.S. Jobs Jobs (Millions) Seasonally Adjusted 150 145 140 135 130 1.41% Prior 12 Months 2.05 Million Net New Jobs in Past 12-Months 125 '07 '08 '09 '10 '11

More information

Holiday Campaigns That Work 3 billion reasons, 5 proven tips

Holiday Campaigns That Work 3 billion reasons, 5 proven tips Holiday Campaigns That Work 3 billion reasons, 5 proven tips Patrick Hansen and Kenan Pollack Senior Interactive Consultants About Us Patrick Hansen Senior Interactive Consultant Eight years experience

More information

USB Drive Antivirus provides comprehensive protection against any virus, worm trying to attack via USB drive. When an USB device is inserted into

USB Drive Antivirus provides comprehensive protection against any virus, worm trying to attack via USB drive. When an USB device is inserted into USB Drive Antivirus provides comprehensive protection against any virus, worm trying to attack via USB drive. When an USB device is inserted into your computer, This crypto-mining Android malware is so

More information

HIGH RISK REPORT J.CREW GROUP, INC. September 14, 2017

HIGH RISK REPORT J.CREW GROUP, INC. September 14, 2017 HIGH RISK REPORT J.CREW GROUP, INC. September 14, 2017 CreditRiskMonitor s assessment of J.Crew Group, Inc. s ( JCG ) high risk status has been determined by a combination of factors: Monthly Average FRISK

More information

Unified Communications Manager Express Toll Fraud Prevention

Unified Communications Manager Express Toll Fraud Prevention Unified Communications Manager Express Toll Fraud Prevention Document ID: 107626 Contents Introduction Prerequisites Requirements Components Used Conventions Overview Internal vs. External Threats Toll

More information

ROHIT WANCHOO 1333, South Park Street, Apt 803, Halifax, NS B3J2K9 M:

ROHIT WANCHOO 1333, South Park Street, Apt 803, Halifax, NS B3J2K9 M: ROHIT WANCHOO 1333, South Park Street, Apt 803, Halifax, NS B3J2K9 M: +19024412385 mailme@rohitwanchoo.com Professional Summary Goal-oriented Senior System Engineer with an experience of 8 years dedicated

More information

Real Estate Forecast 2015

Real Estate Forecast 2015 Real Estate Forecast 2015 No Place But Up Interest Rates Rents Prices Real Estate and the Economy Ted C. Jones, PhD Chief Economist Stewart Title Guaranty Company Thank Heavens for Global Warming Think

More information

Building a Cybersecurity R&D Ecosystem in Singapore

Building a Cybersecurity R&D Ecosystem in Singapore Building a Cybersecurity R&D Ecosystem in Singapore Vivy Suhendra Executive Director, Singapore Cybersecurity Consortium About Us Launched 1 Sep 2016, funded by National Research Foundation (NRF) and anchored

More information

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS HOW SECURE IS YOUR VPN ACCESS? Remote access gateways such as VPNs and firewalls provide critical anywhere-anytime connections to the networks

More information

Your Future with Worldpay. Shane Happach Managing Director, Worldpay ecom

Your Future with Worldpay. Shane Happach Managing Director, Worldpay ecom Your Future with Worldpay Shane Happach Managing Director, Worldpay ecom Leaders in modern money 2 Worldpay 2016. All rights reserved. In 2015 Transactions a day Processed 3 Worldpay 2016. All rights reserved.

More information

SME License Order Working Group Update - Webinar #3 Call in number:

SME License Order Working Group Update - Webinar #3 Call in number: SME License Order Working Group Update - Webinar #3 Call in number: Canada Local: +1-416-915-8942 Canada Toll Free: +1-855-244-8680 Event Number: 662 298 966 Attendee ID: check your WebEx session under

More information

NOT PROTECTIVELY MARKED PHISHING. July 2016

NOT PROTECTIVELY MARKED PHISHING. July 2016 - PHISHING July 2016 1 Introduction: The purpose of this document is to provide an analysis of the most prevalent trends and characteristics of phishing campaigns in the UK in July 2016. The analysis is

More information

Preempting Cyber Fraud: SWIFT Threat Indicator Sharing Tool. Cyber Security 3.0 Better Together August 18, 2017

Preempting Cyber Fraud: SWIFT Threat Indicator Sharing Tool. Cyber Security 3.0 Better Together August 18, 2017 Preempting Cyber Fraud: SWIFT Threat Indicator Sharing Tool Cyber Security 3.0 Better Together August 18, 2017 Research Overview Problem Statement Research Goals & Methodology Defining Insider Cashout

More information

European Emergency Response Services

European Emergency Response Services article European Emergency Response Services for the All-IP Present and Future By Hugh Goldstein, VP Strategic Alliance, Voxbone Voxbone US LLC - San Francisco Office 535 Voxbone Mission US St San 535

More information

SIP Trunking & Security. Dan York, CISSP VOIPSA Best Practices Chair

SIP Trunking & Security. Dan York, CISSP VOIPSA Best Practices Chair SIP Trunking & Security Dan York, CISSP VOIPSA Best Practices Chair September 2, 2009 Privacy Availability Compliance Confidence Mobility Cost Avoidance Business Continuity TDM security is relatively

More information

The Telephony Denial of Service (TDoS) Threat

The Telephony Denial of Service (TDoS) Threat The Telephony Denial of Service (TDoS) Threat An Analysis of the TDoS Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Telephony Denial-of-Service (TDoS) and The Public Voice

More information

DoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action

DoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action DoS Cyber Attack on a Government Agency in South America- February 2012 Anonymous Mobile LOIC in Action 1 Table of Content Preamble...3 About Radware s DefensePro... 3 About Radware s Emergency Response

More information

Introducing Survey123 For ArcGIS

Introducing Survey123 For ArcGIS FedGIS Conference February 24 25, 2016 Washington, DC Introducing Survey123 For ArcGIS James Tedrick, Esri Jawameer Kakakhan, UN OCHA Configurable Solutions That Work Together Vizualize Collect Navigator

More information

Cisco Unified SRST and Cisco Unified SIP SRST Command Reference (All Versions)

Cisco Unified SRST and Cisco Unified SIP SRST Command Reference (All Versions) Cisco Unified SRST and Cisco Unified SIP SRST Command Reference (All Versions) Last Modified: 2017-11-30 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

I Know Where You are and What You are Sharing

I Know Where You are and What You are Sharing I Know Where You are and What You are Sharing Exploiting P2P Communications to Invade Users Privacy Stevens Le Blond, Chao Zhang, Arnaud Legout, Keith Ross, Walid Babbous CS558 Presentation Natasa Ntagianta

More information

January 14, Advanced Methods To Target and Eliminate Unlawful Robocalls, WC Docket No

January 14, Advanced Methods To Target and Eliminate Unlawful Robocalls, WC Docket No Amanda E. Potter AT&T Services, Inc. Assistant Vice President- 1120 20th Street, NW Senior Legal Counsel Suite 1000 Washington, DC 20036 Phone: 202.457.2103 E-mail: amanda.potter@att.com January 14, 2019

More information

2

2 May 2016 1 2 3 4 5 A. Consumer Confidence Index (CCI) - Consumer Confidence Index (CCI) - Current Economic Condition Index (CECI) - Consumer Expectation Index (CEI) Current Economic Condition Index - Current

More information

BlueWater Software Constant Innovation by Orca Wave

BlueWater Software Constant Innovation by Orca Wave BlueWater Software Constant Innovation by Orca Wave Overview: Revenue assurance, cost management and delivering key and timely information to BlueWater Users; are operational pillars of our BlueWater software

More information

Data Transfers in the Grid: Workload Analysis of Globus GridFTP

Data Transfers in the Grid: Workload Analysis of Globus GridFTP Data Transfers in the Grid: Workload Analysis of Globus GridFTP Nicolas Kourtellis, Lydia Prieto, Gustavo Zarrate, Adriana Iamnitchi University of South Florida Dan Fraser Argonne National Laboratory Objective

More information

Decision Making Information from Your Mobile Device with Today's Rockwell Software

Decision Making Information from Your Mobile Device with Today's Rockwell Software Decision Making Information from Your Mobile Device with Today's Rockwell Software PUBLIC Rockwell Automation TechED 2016 @ROKTechED #ROKTechED Copyright 2016 Rockwell Automation, Inc. All Rights Reserved.

More information

2

2 March 2016 1 2 3 4 5 A. Consumer Confidence Index (CCI) - Consumer Confidence Index (CCI) - Current Economic Condition Index (CECI) - Consumer Expectation Index (CEI) Current Economic Condition Index -

More information

Real-time Communications Security and SDN

Real-time Communications Security and SDN Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,

More information

Council, 8 February 2017 Information Technology Report Executive summary and recommendations

Council, 8 February 2017 Information Technology Report Executive summary and recommendations Council, 8 February 2017 Information Technology Report Executive summary and recommendations Introduction This report provides the Council with an update into the work of the Information Technology Directorate

More information

2

2 February 2015 1 2 3 4 5 A. Consumer Confidence Index (CCI) - Consumer Confidence Index (CCI) - Current Economic Condition Index (CECI) - Consumer Expectation Index (CEI) Current Economic Condition Index

More information

APWG Global Phishing Survey 2H2010

APWG Global Phishing Survey 2H2010 APWG Global Phishing Survey 2H2010 Rod Rasmussen Greg Aaron June 21, 2011 Goals Study domain names and URLs to: Provide a consistent benchmark for scope of phishing problems worldwide Understand what phishers

More information

Every product has a story. Let ScanLife tell it.

Every product has a story. Let ScanLife tell it. Every product has a story. Let ScanLife tell it. Think of ScanLife as the get more button. And you decide what happens when they press it. Go to website Save a contact Initiate a call Send an SMS Send

More information

Understanding Cisco Unified Communications Security

Understanding Cisco Unified Communications Security Cisco Support Community Presents Tech-Talk Series Understanding Cisco Unified Communications Security Akhil Behl Solutions Architect, akbehl@cisco.com Author of Securing Cisco IP Telephony Networks 2010

More information

June 2, If you have questions, please do not hesitate to contact me at (517) Sincerely,

June 2, If you have questions, please do not hesitate to contact me at (517) Sincerely, RICK SNYDER GOVERNOR STATE OF MICHIGAN DEPARTMENT OF LICENSING AND REGULATORY AFFAIRS PUBLIC SERVICE COMMISSION GREG R. WHITE JOHN D. QUACKENBUSH SALLY A. TALBERG COMMISSIONER CHAIRMAN COMMISSIONER MIKE

More information

REPORT. Year In Review. proofpoint.com

REPORT. Year In Review. proofpoint.com REPORT Year In Review proofpoint.com Email fraud, also known as business email compromise (BEC), is one of today s greatest cyber threats. These socially engineered attacks seek to exploit people rather

More information

Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution

Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution Bharat Srinivasan 1, Payas Gupta 2, Manos Antonakakis 1, and Mustaque Ahamad 1,2 1 Georgia Institute of Technology, Atlanta,

More information

Who We Are! Natalie Timpone

Who We Are! Natalie Timpone Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who

More information

The Power of Prediction: Cloud Bandwidth and Cost Reduction

The Power of Prediction: Cloud Bandwidth and Cost Reduction The Power of Prediction: Cloud Bandwidth and Cost Reduction Eyal Zohar Israel Cidon Technion Osnat(Ossi) Mokryn Tel-Aviv College Traffic Redundancy Elimination (TRE) Traffic redundancy stems from downloading

More information

Bank of america report phishing

Bank of america report phishing Search Search pages & people Search Search Search pages & people Search Bank of america report phishing email We recently discovered a new phishing scam from a Bank of America spam email some reports that

More information

New Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks

New Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks New Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks 1 WOULD YOU OPEN THIS ATTACHMENT? Over 90% of targeted emails use malicious file attachments as the payload or infection source

More information

Vodafone Global FACTS

Vodafone Global FACTS Vodafone Global FACTS Stefanie Schmidt, Stefan Deckers July 2018 C1-Vodafone External C1-Vodafone External 2 Global FACTS Overview & Introduction Luxembourg Global Roamer Germany 23 Countries Overview

More information

DMARC Continuing to enable trust between brand owners and receivers

DMARC Continuing to enable trust between brand owners and receivers DMARC Continuing to enable trust between brand owners and receivers February 2014 1 DMARC Defined DMARC stands for: Domain-based Message Authentication, Reporting & Conformance (pronounced dee-mark ) 2

More information

Larry Kreger Jr. Credit Analyst Farm Credit West

Larry Kreger Jr. Credit Analyst Farm Credit West Larry Kreger Jr. Credit Analyst Farm Credit West Cash Receipts by Sector $5,000,000,000 $4,500,000,000 $4,000,000,000 $3,500,000,000 $3,000,000,000 $2,500,000,000 $2,000,000,000 $1,500,000,000 $1,000,000,000

More information

June 2012 First Data PCI RAPID COMPLY SM Solution

June 2012 First Data PCI RAPID COMPLY SM Solution June 2012 First Data PCI RAPID COMPLY SM Solution You don t have to be a security expert to be compliant. Developer: 06 Rev: 05/03/2012 V: 1.0 Agenda Research Background Product Overview Steps to becoming

More information

Nigerian Telecommunications (Services) Sector Report Q3 2016

Nigerian Telecommunications (Services) Sector Report Q3 2016 Nigerian Telecommunications (Services) Sector Report Q3 2016 24 NOVEMBER 2016 Telecommunications Data The telecommunications data used in this report were obtained from the National Bureau of Statistics

More information

AIL Framework for Analysis of Information Leaks From a CSIRT use-case towards a generic analysis open source software

AIL Framework for Analysis of Information Leaks From a CSIRT use-case towards a generic analysis open source software AIL Framework for Analysis of Information Leaks From a CSIRT use-case towards a generic analysis open source software Team CIRCL - TLP:WHITE info@circl.lu FIRST 2017 Leaks and CSIRT day-to-day operations

More information

Best Practices in Public Information Management in Sri Lanka. Presented by Nimal Athukorala D.C. Dissanayake

Best Practices in Public Information Management in Sri Lanka. Presented by Nimal Athukorala D.C. Dissanayake Best Practices in Public Information Management in Sri Lanka Presented by Nimal Athukorala D.C. Dissanayake Content Objectives Method of Information Management Case Study- GIC Call Center GIC Web Portal

More information

HPE Security Data Security. HPE SecureData. Product Lifecycle Status. End of Support Dates. Date: April 20, 2017 Version:

HPE Security Data Security. HPE SecureData. Product Lifecycle Status. End of Support Dates. Date: April 20, 2017 Version: HPE Security Data Security HPE SecureData Product Lifecycle Status End of Support Dates Date: April 20, 2017 Version: 1704-1 Table of Contents Table of Contents... 2 Introduction... 3 HPE SecureData Appliance...

More information

Modern IP Communication bears risks

Modern IP Communication bears risks Modern IP Communication bears risks How to protect your business telephony from cyber attacks Voice-over-IP (VoIP) provides many new features over PSTN. However, the interconnection with your IT infrastructure

More information

spam goes mobile Comverse User Forum 29th June 2005, Marbella (Spain)

spam goes mobile Comverse User Forum 29th June 2005, Marbella (Spain) spam goes mobile Comverse User Forum 29th June 2005, Marbella (Spain) Lara Srivastava Project Director- ITU New Initiatives Programme Strategy and Policy Unit, ITU Note: The views expressed in this presentation

More information

Asks for clarification of whether a GOP must communicate to a TOP that a generator is in manual mode (no AVR) during start up or shut down.

Asks for clarification of whether a GOP must communicate to a TOP that a generator is in manual mode (no AVR) during start up or shut down. # Name Duration 1 Project 2011-INT-02 Interpretation of VAR-002 for Constellation Power Gen 185 days Jan Feb Mar Apr May Jun Jul Aug Sep O 2012 2 Start Date for this Plan 0 days 3 A - ASSEMBLE SDT 6 days

More information

This tutorial is designed for those who would like to understand the basics of i-mode in simple and easy steps.

This tutorial is designed for those who would like to understand the basics of i-mode in simple and easy steps. About the Tutorial NTT DoCoMo's i-mode is a mobile internet service popular in Japan. i-mode was invented by a team led by Mari Matsunaga in February 1999 at NTT DoCoMo. This tutorial explains the basic

More information

Optimizing Field Operations. Jeff Shaner

Optimizing Field Operations. Jeff Shaner Optimizing Field Operations Jeff Shaner Field GIS Taking GIS Beyond the Office Collecting Data Reporting Observations Managing Work Connecting the Field with the Enterprise Workforce for ArcGIS Field workforce

More information

Federal Trade Commission Protecting Consumer Privacy. J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission

Federal Trade Commission Protecting Consumer Privacy. J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission Federal Trade Commission Protecting Consumer Privacy J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission FTC s Approach to Privacy Consumers are concerned about consequences

More information