Blog Posts Tagged with "Telecom"


Skype in the Enterprise: Is Your Security Program Ready to Chat?

November 27, 2011 Added by:Brandon Knight

Beside the fact that it's possible to have a bit more confidence in how Skype traffic is encrypted, is there enough information now to make a fully-formed risk decision on whether or not to use Skype? It's useful to step back and evaluate the fuller picture in the context of your existing operations...

Comments  (0)


The Apocalypse Cycle: Preparing for Infrastructure Failure

November 02, 2011 Added by:Infosec Island Admin

The snow storm in October made me once again ponder my own readiness with regard to how to handle infrastructure failures. These same events have shown me just how clueless all too many people are about how to survive when their infrastructure goes down for any extended period of time...

Comments  (1)


Maintaining Quality in Outsourcing Telco Services

September 30, 2011 Added by:Bozidar Spirovski

The issue with telco services is that quality is difficult to define because there are parameters that are difficult to track: sound quality, response of system to tone-dial menu selection of an IVR, intermittent interruptions of communications, and temporarily unavailable service...

Comments  (0)


China: What Evil Lurks Within?

September 06, 2011 Added by:Joel Harding

Eli Lake of the Washington Post is again using our fear of the unknown against us. In his article, he brings up Huawei's attempts to operate as, well, a business. Huawei is accused, as a high tech telecommunications company, of attempting to get equipment onto the US 4G cell network...

Comments  (1)


Ghost in the Wires: The World's Most Wanted Hacker

September 02, 2011 Added by:Ben Rothke

In Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, the first personal account of what really happened; Mitnick says most of the stories around him were the result of the myth of Kevin Mitnick, and nothing more. In the book, he dispels these myths and set the record straight...

Comments  (5)


EFF Challenges NSA's Domestic Surveillance in Court

September 01, 2011 Added by:Headlines

At stake is whether the courts can judge the legality and constitutionality of the NSA's bulk interception of Americans' phone calls and emails, accomplished through back-door access to AT&T's domestic telecom network and its databases of communications records...

Comments  (3)


VoIP Vendor Ooma Outage: No DoS Attack Involved

August 18, 2011 Added by:Headlines

Customer services were interrupted by a power failure at the company's data center while their corporate website was simultaneously experiencing excessive traffic levels that was initially reported to have been caused by a denial of service (DoS) attack...

Comments  (1)


Telecoms to Cap Bandwidth and Impose Usage Fees

March 15, 2011 Added by:Headlines

Services like Netflix and other companies that provide streaming media could be impacted, as users would need to limit themselves to an average of less than ninety minutes of media per day to avoid the increased fees...

Comments  (0)


Utilizing Forensics and Honeypots for VoIP Security

February 24, 2011 Added by:J. Oquendo

It's a game of sorting out what possible accounts exist on a machine, and which accounts can have a dictionary attack launched against them. The vast majority of attackers will use yet another SIPVicious tool called svcrack against a machine they've scanned and constructed an account list for...

Comments  (0)


Vodafone Investigating Database Breach Allegations

January 09, 2011 Added by:Headlines

"Any unauthorised access to the portal will be taken very seriously, and would constitute a breach of employment or dealer agreement and possibly a criminal offence. All passwords have been reset and a review is being undertaken of the training and process as an additional precaution..."

Comments  (0)


Mobile Providers Must Tap Customer Knowledge

December 25, 2010 Added by:Rahul Neel Mani

Mobile services providers need to build on their intimate knowledge of their customers to differentiate themselves and create compelling, affordable packages, or risk losing customers and revenue...

Comments  (0)


Chinese Pursue State Sponsored Cyber Espionage

November 18, 2010 Added by:Headlines

Reports have asserted that the Chinese government is actively using Chinese telecom companies to conduct cyber espionage against the United States, and questions have been raised about partnerships with Chinese telecom companies and corporations tied to Governor-elect Rick Snyder of Michigan...

Comments  (0)


Attacks Against Critical Infrastructure On the Rise

November 16, 2010 Added by:Headlines

More than three-quarters of respondents indicated the frequency of attacks was increasing. Companies reported an average of ten attacks over the past five years, and nearly half of those surveyed expect to be subject to another attack in the next twelve months...

Comments  (2)


China Hijacked Fifteen Percent of Internet Traffic

November 12, 2010 Added by:Headlines

Imagine the capability and capacity that is built into their networks. I’m not sure there was anyone else in the world who could have taken on that much traffic without breaking a sweat - Dmitri Alperovitch, McAfee's vice president of threat research stated...

Comments  (0)


Verecloud Hoping to Save the Telcos

October 16, 2010 Added by:Ben Kepes

Cloud services are a completely logical move for telcos – after all voice services are arguably a perfect example of the very utility products that cloud is fashioned after. Telcos already have customer billing relationships, tagging more services on top of that should be easy. But...

Comments  (1)


Telecom Development: Simple Rules, No Magic

September 10, 2010 Added by:Rahul Neel Mani

The pace of growth at Reliance Communications is faster than that of other leading telcos in India, says Alpna Doshi, CIO, Reliance Communications. In a chat with Rahul Neel Mani, she outlines the company’s IT plans and growth initiatives in the immediate future...

Comments  (0)

Page « < 1 - 2 > »