Blog Posts Tagged with "Telecom"

4eb356e09746aadc2f4800877e8c24e8

Skype in the Enterprise: Is Your Security Program Ready to Chat?

November 27, 2011 Added by:Brandon Knight

Beside the fact that it's possible to have a bit more confidence in how Skype traffic is encrypted, is there enough information now to make a fully-formed risk decision on whether or not to use Skype? It's useful to step back and evaluate the fuller picture in the context of your existing operations...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Apocalypse Cycle: Preparing for Infrastructure Failure

November 02, 2011 Added by:Infosec Island Admin

The snow storm in October made me once again ponder my own readiness with regard to how to handle infrastructure failures. These same events have shown me just how clueless all too many people are about how to survive when their infrastructure goes down for any extended period of time...

Comments  (1)

E973b16363b3de77b360563237df7e32

Maintaining Quality in Outsourcing Telco Services

September 30, 2011 Added by:Bozidar Spirovski

The issue with telco services is that quality is difficult to define because there are parameters that are difficult to track: sound quality, response of system to tone-dial menu selection of an IVR, intermittent interruptions of communications, and temporarily unavailable service...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

China: What Evil Lurks Within?

September 06, 2011 Added by:Joel Harding

Eli Lake of the Washington Post is again using our fear of the unknown against us. In his article, he brings up Huawei's attempts to operate as, well, a business. Huawei is accused, as a high tech telecommunications company, of attempting to get equipment onto the US 4G cell network...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Ghost in the Wires: The World's Most Wanted Hacker

September 02, 2011 Added by:Ben Rothke

In Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, the first personal account of what really happened; Mitnick says most of the stories around him were the result of the myth of Kevin Mitnick, and nothing more. In the book, he dispels these myths and set the record straight...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

EFF Challenges NSA's Domestic Surveillance in Court

September 01, 2011 Added by:Headlines

At stake is whether the courts can judge the legality and constitutionality of the NSA's bulk interception of Americans' phone calls and emails, accomplished through back-door access to AT&T's domestic telecom network and its databases of communications records...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

VoIP Vendor Ooma Outage: No DoS Attack Involved

August 18, 2011 Added by:Headlines

Customer services were interrupted by a power failure at the company's data center while their corporate website was simultaneously experiencing excessive traffic levels that was initially reported to have been caused by a denial of service (DoS) attack...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Telecoms to Cap Bandwidth and Impose Usage Fees

March 15, 2011 Added by:Headlines

Services like Netflix and other companies that provide streaming media could be impacted, as users would need to limit themselves to an average of less than ninety minutes of media per day to avoid the increased fees...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Utilizing Forensics and Honeypots for VoIP Security

February 24, 2011 Added by:J. Oquendo

It's a game of sorting out what possible accounts exist on a machine, and which accounts can have a dictionary attack launched against them. The vast majority of attackers will use yet another SIPVicious tool called svcrack against a machine they've scanned and constructed an account list for...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Vodafone Investigating Database Breach Allegations

January 09, 2011 Added by:Headlines

"Any unauthorised access to the portal will be taken very seriously, and would constitute a breach of employment or dealer agreement and possibly a criminal offence. All passwords have been reset and a review is being undertaken of the training and process as an additional precaution..."

Comments  (0)

F520f65cba281c31e29c857faa651872

Mobile Providers Must Tap Customer Knowledge

December 25, 2010 Added by:Rahul Neel Mani

Mobile services providers need to build on their intimate knowledge of their customers to differentiate themselves and create compelling, affordable packages, or risk losing customers and revenue...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Pursue State Sponsored Cyber Espionage

November 18, 2010 Added by:Headlines

Reports have asserted that the Chinese government is actively using Chinese telecom companies to conduct cyber espionage against the United States, and questions have been raised about partnerships with Chinese telecom companies and corporations tied to Governor-elect Rick Snyder of Michigan...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attacks Against Critical Infrastructure On the Rise

November 16, 2010 Added by:Headlines

More than three-quarters of respondents indicated the frequency of attacks was increasing. Companies reported an average of ten attacks over the past five years, and nearly half of those surveyed expect to be subject to another attack in the next twelve months...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

China Hijacked Fifteen Percent of Internet Traffic

November 12, 2010 Added by:Headlines

Imagine the capability and capacity that is built into their networks. I’m not sure there was anyone else in the world who could have taken on that much traffic without breaking a sweat - Dmitri Alperovitch, McAfee's vice president of threat research stated...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Verecloud Hoping to Save the Telcos

October 16, 2010 Added by:Ben Kepes

Cloud services are a completely logical move for telcos – after all voice services are arguably a perfect example of the very utility products that cloud is fashioned after. Telcos already have customer billing relationships, tagging more services on top of that should be easy. But...

Comments  (1)

F520f65cba281c31e29c857faa651872

Telecom Development: Simple Rules, No Magic

September 10, 2010 Added by:Rahul Neel Mani

The pace of growth at Reliance Communications is faster than that of other leading telcos in India, says Alpna Doshi, CIO, Reliance Communications. In a chat with Rahul Neel Mani, she outlines the company’s IT plans and growth initiatives in the immediate future...

Comments  (0)

Page « < 1 - 2 > »