Blog Posts Tagged with "Telecom"
November 27, 2011 Added by:Brandon Knight
Beside the fact that it's possible to have a bit more confidence in how Skype traffic is encrypted, is there enough information now to make a fully-formed risk decision on whether or not to use Skype? It's useful to step back and evaluate the fuller picture in the context of your existing operations...
November 02, 2011 Added by:Infosec Island Admin
The snow storm in October made me once again ponder my own readiness with regard to how to handle infrastructure failures. These same events have shown me just how clueless all too many people are about how to survive when their infrastructure goes down for any extended period of time...
September 30, 2011 Added by:Bozidar Spirovski
The issue with telco services is that quality is difficult to define because there are parameters that are difficult to track: sound quality, response of system to tone-dial menu selection of an IVR, intermittent interruptions of communications, and temporarily unavailable service...
September 06, 2011 Added by:Joel Harding
Eli Lake of the Washington Post is again using our fear of the unknown against us. In his article, he brings up Huawei's attempts to operate as, well, a business. Huawei is accused, as a high tech telecommunications company, of attempting to get equipment onto the US 4G cell network...
September 02, 2011 Added by:Ben Rothke
In Ghost in the Wires: My Adventures as the World's Most Wanted Hacker, the first personal account of what really happened; Mitnick says most of the stories around him were the result of the myth of Kevin Mitnick, and nothing more. In the book, he dispels these myths and set the record straight...
September 01, 2011 Added by:Headlines
At stake is whether the courts can judge the legality and constitutionality of the NSA's bulk interception of Americans' phone calls and emails, accomplished through back-door access to AT&T's domestic telecom network and its databases of communications records...
August 18, 2011 Added by:Headlines
Customer services were interrupted by a power failure at the company's data center while their corporate website was simultaneously experiencing excessive traffic levels that was initially reported to have been caused by a denial of service (DoS) attack...
March 15, 2011 Added by:Headlines
Services like Netflix and other companies that provide streaming media could be impacted, as users would need to limit themselves to an average of less than ninety minutes of media per day to avoid the increased fees...
February 24, 2011 Added by:J. Oquendo
It's a game of sorting out what possible accounts exist on a machine, and which accounts can have a dictionary attack launched against them. The vast majority of attackers will use yet another SIPVicious tool called svcrack against a machine they've scanned and constructed an account list for...
January 09, 2011 Added by:Headlines
"Any unauthorised access to the portal will be taken very seriously, and would constitute a breach of employment or dealer agreement and possibly a criminal offence. All passwords have been reset and a review is being undertaken of the training and process as an additional precaution..."
November 18, 2010 Added by:Headlines
Reports have asserted that the Chinese government is actively using Chinese telecom companies to conduct cyber espionage against the United States, and questions have been raised about partnerships with Chinese telecom companies and corporations tied to Governor-elect Rick Snyder of Michigan...
November 16, 2010 Added by:Headlines
More than three-quarters of respondents indicated the frequency of attacks was increasing. Companies reported an average of ten attacks over the past five years, and nearly half of those surveyed expect to be subject to another attack in the next twelve months...
November 12, 2010 Added by:Headlines
Imagine the capability and capacity that is built into their networks. I’m not sure there was anyone else in the world who could have taken on that much traffic without breaking a sweat - Dmitri Alperovitch, McAfee's vice president of threat research stated...
October 16, 2010 Added by:Ben Kepes
Cloud services are a completely logical move for telcos – after all voice services are arguably a perfect example of the very utility products that cloud is fashioned after. Telcos already have customer billing relationships, tagging more services on top of that should be easy. But...
September 10, 2010 Added by:Rahul Neel Mani
The pace of growth at Reliance Communications is faster than that of other leading telcos in India, says Alpna Doshi, CIO, Reliance Communications. In a chat with Rahul Neel Mani, she outlines the company’s IT plans and growth initiatives in the immediate future...
SecurityWeek NCAA Bracket Challenge: Registe... aman mathur on 03-25-2015
Update 3: Hackers May Leak Norton Antivirus ... jhunax Astillero on 03-25-2015
Bridging the Cybersecurity Divide, Why Secur... suresh dwivedi on 03-25-2015