How to tackle fraud in a VoIP environment

Service providers have long recognised that Voice over Internet Protocol (VoIP) services can be exposed to a variety of potentially fraudulent situations.

There are some inherent vulnerabilities that hackers could exploit, namely three way calls and call transfers. In this case, hackers can inject call signals into the network and essentially hijack calls. This then leads to significant non-billable revenue for service providers.

The reason that these vulnerabilities occur is that it’s a relatively...

By Graham Kunz, 11 December 2013, 0 comments. Categories: Networks, Security, VoiP.

Scroogle you too US Government, says Microsoft

Microsoft’s reputation – along with many other top technology firms – was damaged by the NSA revelations which, if Edward Snowden’s leaks are correct, the Redmond-based firm was involved in the programme; whether knowingly or not.

Now it’s the turn of Brad Smith, Microsoft’s general counsel, to help ease customer distrust in the company’s services by speaking of their shared concerns about government surveillance of the...

By Ryan Daws, 05 December 2013, 0 comments. Categories: Big Data, Consumers, Industry, N America, Security.

Warwick Warp’s CEO on biometric ID for personalised experiences #TTW

TelecomsTech (TT) spoke to Stewart Hefferman (SH) at Telecoms Tech World in London this week about the company for which he is the CEO, Warwick Warp, about the increasing capabilities of biometric identity personalisation.

Stewart was previously CEO of OmniPerception; a facial recognition and matching system under the Digital Barriers brand. Here he was also involved in biometrics, and certainly has the experience to answer anything we could chuck at him credibly!

TT: What makes the solutions...

By Ryan Daws, 29 November 2013, 0 comments. Categories: Industry, Mobile, Security, Smartphones, Startups.

Leaked agreement allowed NSA to hold UK information (with or without consent)

If you’re reading this and haven’t heard of the NSA and their controversial spying program PRISM we reported on around five months ago – you can catch-up here. Up to date? Followers thought so as well; but yet more revelations have come to light…

It was previously revealed that surveillance reached further than US jurisdiction; causing the EU commissioner for justice and fundamental rights, Viviane Reding, to

By Ryan Daws, 21 November 2013, 0 comments. Categories: Europe, Industry, N America, Security.

Your cup o’ Joe (or any hot beverage) isn’t even safe from hackers

Hackers are indisputably clever; every day finding new ways to circumvent barriers and find their way into your devices. The battle between “White Hats” and “Black Hats” is one which has waged on with increasing intensiveness for decades – and only set to grow. Not even your kettle is safe.

Russian authorities claimed that household appliances imported from China have been found to contain tiny microchips which seek out open WiFi networks and then distribute malware.

St...

By Ryan Daws, 06 November 2013, 0 comments. Categories: Big Data, Security, WiFi, Wireless.

Mobile operators help customers to help themselves in battle against spam

With a recent report from the University of Minnesota and AT&T Labs revealing that more than two-thirds of mobile phone users received short message service (SMS) spam last year, there is no denying that these kinds of attacks are creating a headache for mobile phone users. However, mobile users are not the only victims, as mobile fraudsters, spammers and scammers are becoming increasingly problematic for mobile operators.

In 2012, 4.5 billion mobile spam messages were received, with 350,000 variants of...

By JF Sullivan, 31 October 2013, 0 comments. Categories: Mobile, Networks, Operators, Security.

Voice startup ‘hello’ wants you to say goodbye to Skype

A new Indiegogo campaign by the name of ‘hello’ launches today, with its founder claiming he wants to create “the Mozilla of telephony”.

Paul Grimshaw, the company’s founder, claims that the peer-to-peer voice startup is unique in that it offers complete customisation and branding, with users being able to connect between different providers and move freely between them.

For instance, Canonical could set up an...

By Ryan Daws, 07 October 2013, 0 comments. Categories: Apps, Consumers, Entertainment, Security, Smartphones, Startups.

UK prepares to defend (and fight) Cyber Warfare with new unit

Next-generation warfare doesn’t sound quite as appealing as next-generation consoles; but they have something in common, they are both likely to be technologically-based.

Internationally we are fairly versed in frontline, manned, mechanical battles; guns, tanks, ships, jets, helicopters – all the devastating machinery which has stolen too many lives.

Yet the latest, and perhaps biggest threat; many of us have in our bedrooms – the computer.

Many see the “Internet of Things” trend in a utopian...

By Ryan Daws, 30 September 2013, 0 comments. Categories: Europe, Industry, Infrastructure, Security.

Would you recruit an ex-hacker? Most IT professionals would

A survey conducted by IT recruitment specialists CWJobs.co.uk shows that 70% of IT professionals believe that hiring ex-hackers could be the solution to security problems. After all, who better to protect against intrusions than the people who do it daily?

The most high-profile case in my recent knowledge was that of infamous iOS “Jailbreaker” and PlayStation hacker GeoHot; who was snapped-up by social networking giant Facebook not long after an intense lawsuit by Sony.

Whilst the most common...

By Ryan Daws, 27 September 2013, 1 comment. Categories: Industry, Piracy, Research, Security.

Do we put too much faith in Apple (and others’) security features?

One of the highlight features of Apple’s latest iPhone, the 5S, is the inclusion of a unique fingerprint scanner – futuristically hidden underneath the device’s iconic “home” button. But are we putting too much faith in Apple (and others') security features?

According to an NBC survey, iPhones make up 58% of usage within the House of Representatives in the US – important positions; which require high security.

Yet the U.S. military did not authorise the use of Apple’s...

By Ryan Daws, 23 September 2013, 0 comments. Categories: Consumers, Industry, Mobile, Piracy, Security.