Phone number spoofing is a known problem, one that has been around for years and addressable via solutions from companies such as Pindrop that help determine the probability that the caller’s number is legitimate.
A week and a half ago, my 92-year-old father received a call from his eldest granddaughter. “Hi Grandpa, how are you feeling?” she asked. He responded that he was doing well, and that his most recent doctor appointments had gone as expected.
As you're driving into work, you witness a horrific crash in the lane next to you. Quickly, you grab your cell phone and dial 911.
Enterprise Connect 2018 is officially behind us, a week jam-packed with product news delivered from a host of the 190+ exhibitors on the show floor...
VoIP users have access to the caller ID field, and it can be set to whatever they want. This is a key advantage to those perpetrating fraud since they don't need many technical skills to make this work. Fraud perpetrators have developed software to reset PINs and access accounts and IVR systems. This is called call center fraud.
Enterprises must work hand in hand with UCaaS providers to ensure strong end-to-end security of communications delivered from the cloud.
In a denial-of-service (DoS) attack, the goal is to make a resource unavailable to its intended users, usually in a temporary interruption or suspension of services. DoS attacks are well known in data systems and networks, but can also happen to a telecom system or network.