Voice Phishing: System to Trace Telephone Call Paths Across Multiple Networks Developed

Phishing scams are making the leap from email to the world’s voice systems, and a team of researchers in the Georgia Tech College of Computing has found a way to tag fraudulent calls with a digital “fingerprint” that will help separate legitimate calls from phone scams.

Voice phishing (or “vishing”) has become much more prevalent with the advent of cellular and voice IP (VoIP) networks, which enable criminals both to route calls through multiple networks to avoid detection and to fake caller ID information.

However each network through which a call is routed leaves its own telltale imprint on the call itself, and individual phones have their own unique signatures, as well.

Funded in part by the National Science Foundation, the Georgia Tech team created a system called “PinDr0p” that can analyze and assemble those call artifacts to create a fingerprint — the first step in determining “call provenance,” a term the researchers coined.

Continue reading …

Related Posts

Using Decision Trees to predict infant birth weights In this article, I will show you how to use decision trees to predict whether the birth weights of infants will be low or not. We will use the birthwt...
The future is encrypted, but your government says that’s not good On the same day that an article titled Security and Privacy on the Encrypted Network: The Future is Encrypted was published by an information security...
Android Ice Cream Sandwich ported to x86 tablets, netbooks and notebooks Linpus Technologies, Inc., a Linux software solutions provider based in Taipei, Taiwan, just announced that they have ported Ice Cream Sandwich, the l...
Gameplay 1.2, open source game development framework, released Gameplay 1.2, a cross-platform, C++ game framework designed for learning and writing mobile and desktop games, has been released. Gameplay is an o...
Towards a mandatory, always-on and ubiquitous encryption in XMPP networks Now that we know that our online communications are not necessarily private and secure, there is a growing need to have end-to-end encryption built in...
Limerick migrates to Zentyal’s open source email solution The city of Limerick, located in mid-west Ireland and, which at a population of about 110,000, is that country's third largest city, has chosen Zentya...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*