Cybersecurity

New Bill Would Push for Cybersecurity Improvements at 911 Call Centers

Faced with national 911 systems deemed increasingly vulnerable to cyberattack, Sens. Bill Nelson, D-Fla., and Amy Klobuchar, D-Minn., will introduce a bill within the next few weeks to federally fund and hasten the national transition to next generation 911 (NG911) systems.

The Next Generation of Cyber Attacks — PDoS, TDoS, and Others

Another attack type that has flown under the radar is Telephony Denial of Service (TDoS). This attack type will likely rise in sophistication and become a key tool in cyber attackers’ arsenals, particularly those who are more interested in wreaking havoc than having financial gain as a motivator

Stopping Senior Scams: Developments in Financial Fraud Affecting Seniors

Timothy P. Campus, Deputy Inspector General for Investigations and Treasury Inspector General for Tax Administration, recently released a testimony before the US Senate's Special Committee on Aging.  

The Dos and Don'ts of Securing Your VoIP Communications

Like every other cloud-based, internet-connected application running within your business, Voice-over-IP (VoIP) apps require comprehensive security. Whether it's ensuring secure user authentication and network configuration or enabling end-to-end encryption in all VoIP communication and data storage, organizations need to be diligent in both overseeing IT management and working closely with their business VoIP provider to ensure that security requirements are being met and enforced.

We All Know Email Can Be Hacked, But What's Next? (Shhh It's Voice)

If you are like most people, you are beginning to wonder if anyone has even a tenth of a clue about how to protect email. We all watched, for example, as reams of stolen political correspondence from a major email provider were posted each day leading up to the recent election, more than likely influencing the outcome.

FBI Looking for Source of 'Robocall' Bomb Threats to Jewish Centers

NEW YORK / WASHINGTON - A wave of telephone bomb threats to 16 Jewish community centers in nine US states may have originated from the same number and been placed by at least one individual and an automated calling system, security officials said on Tuesday.
 

AT&T Takes Aim At Scam Callers

Wouldn’t it be nice if spam or scam calls were blocked before they ever reached your mobile phone?

Just imagine: the “Microsoft tech support” crook couldn’t threaten to chop you up like a stew ingredient and toss you in the river when you resist installing his credential-snarfing malware.

AT&T Starts Robocalls Crackdown With 'Call Protect' Service To Block Spam Phone Calls: How It Works:

AT&T officially launched its new Call Protect service, aiming to protect its customers from automated phone calls commonly known as "robocalls."

Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP

There are numerous protocolsused in voice-over-IP (VoIP) communications. According to IBM Managed Security Services (MSS) data, the most targeted VoIP protocol is Session Initiation Protocol (SIP), which accounted for over 51 percent of the security event activity analyzed in the last 12 months.

Pulling our head out of the sand on cybersecurity

Imagine dialing 911 during a crisis in your’s or a loved-one’s life. Now, imagine that no one answers your call for help. Why? Because a cyber-criminal has locked the 911 call center’s ability to receive your call.

Exploring Telephony Denial of Service

In a denial-of-service (DoS) attack, the goal is to make a resource unavailable to its intended users, usually in a temporary interruption or suspension of services. DoS attacks are well known in data systems and networks, but can also happen to a telecom system or network.

iOS WebView Auto Dialer Bug

iOS WebViews can be used to automatically call an attacker controlled phone number. The attack can block the phone's UI for a short amount of time and therefore prevent the victim from canceling the call. The bug is an application bug that likely is due to bad OS/framework defaults. One major issue with this vulnerability is that it is really easy to exploit. App developers have to fix their code as soon as possible. 

Lacey Police Arrest Man in Internet Hoax That Flooded Thurston 911 With Non-Emergency Calls

A 18-year-old Thurston County man was arrested Wednesday for his alleged involvement in an internet hoax that flooded Thurston Communications 911 with non-emergency calls Tuesday night, according to Lacey police.


Read more here: http://www.theolympian.com/news/local/article110606177.html#storylink=cpy