Voice Phishing: System to Trace Telephone Call Paths Across Multiple Networks Developed

Phishing scams are making the leap from email to the world’s voice systems, and a team of researchers in the Georgia Tech College of Computing has found a way to tag fraudulent calls with a digital “fingerprint” that will help separate legitimate calls from phone scams.

Voice phishing (or “vishing”) has become much more prevalent with the advent of cellular and voice IP (VoIP) networks, which enable criminals both to route calls through multiple networks to avoid detection and to fake caller ID information.

However each network through which a call is routed leaves its own telltale imprint on the call itself, and individual phones have their own unique signatures, as well.

Funded in part by the National Science Foundation, the Georgia Tech team created a system called “PinDr0p” that can analyze and assemble those call artifacts to create a fingerprint — the first step in determining “call provenance,” a term the researchers coined.

Continue reading …

Related Posts

How to install TwitteR, a Twitter client for R Installing packages in R is pretty easy, if you know the name of the package you wish to install. Just pass the name of the package to the install.pac...
Tizen 2.0 Alpha code and SDK released The source code and the SDK for Tizen 2.0 alpha has been released. Tizen is a Linux distribution for mobile platforms cobbled together with parts from...
Mozilla explains why it gave in to pro-DRM in HTML forces For several years, the Electronic Frontier Foundation (EFF) and the Free Software Foundation (FSF) have been waging a campaign against the introductio...
How to install S3QL from source on Fedora 19 S3QL is an online file system for UNIX-like operating systems that provide features like compression, encryption, data de-duplication, immutable trees...
Using Flannel as a soft-defined networking solution for rkt containers Flannel is an open source soft-defined networking solution for containers. It works by making a subnets available to hosts for use with container runt...
A 10-minute guide to Kubernetes Editor: This article was originally published by Omer Dawelbeit under the title "Learn the Kubernetes Key Concepts in 10 Minutes". In this post I w...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*