Voice Phishing: System to Trace Telephone Call Paths Across Multiple Networks Developed

Phishing scams are making the leap from email to the world’s voice systems, and a team of researchers in the Georgia Tech College of Computing has found a way to tag fraudulent calls with a digital “fingerprint” that will help separate legitimate calls from phone scams.

Voice phishing (or “vishing”) has become much more prevalent with the advent of cellular and voice IP (VoIP) networks, which enable criminals both to route calls through multiple networks to avoid detection and to fake caller ID information.

However each network through which a call is routed leaves its own telltale imprint on the call itself, and individual phones have their own unique signatures, as well.

Funded in part by the National Science Foundation, the Georgia Tech team created a system called “PinDr0p” that can analyze and assemble those call artifacts to create a fingerprint — the first step in determining “call provenance,” a term the researchers coined.

Continue reading …

Related Posts

Boeing Black Android smartphone will self-destruct if tampered with Boeing has made an entry into the mobile device market with its own Android smartphone called the Boeing Black smartphone. Yep, it's black in color...
Top cyber security concerns for 2014 and beyond As 2013 draws to a close, it's time to start looking ahead to next year and years after that. This will form a series of articles on what lies ahead. ...
Clustering Atomic Hosts with Kubernetes, Ansible, and Vagrant A single Atomic Host is a fine place to run your containers, but these hosts are much more fun when bunched into clusters, a task that we can manage w...
Silent Mail, FreedomMail or Lavamail. Whatever it’s called, it will offer the same b... Dark Mail alliance is the non-profit group formed by the leaders of Silent Circle and Lavabit. Silent Circle offers a suite of secure, communicatio...
Fluentd vs. Logstash: A Comparison of Log Collectors The unsung heroes of log analysis are the log collectors. They are the hard-working daemons that run on servers to pull server metrics, parse log file...
No, availability is not security! Security is a very important factor in my choice of distributions and software solutions, and I tend to hold a very strict view of what it means from ...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*