Category Archives: Vulnerabilities

NSA Director Warns of ‘Dramatic’ Cyberattack in Next Decade

The director of the National Security Agency issued a warning Thursday about cyberthreats emerging from other countries against networks running critical U.S. infrastructure systems. Adm. Michael Rogers said he expects a major cyberattack against the U.S. in the next decade. “It’s only a matter of the ‘when,’ not the ‘if,’ that we are going to…
Read more

'One Ring' Wireless Phone Scam | FCC.gov

The FCC has recently learned of a new phone scam targeting wireless consumers. Some wireless consumers are receiving calls from phone numbers with three-digit area codes that appear to be domestic, but are actually associated with international pay-per-call phone numbers.  These calls often disconnect after one ring, not giving the consumer time to answer the…
Read more

Preventing Toll Fraud

The best defense against toll fraud remains an educated customer. MASS is totally committed to the control of toll fraud. While no telecommunications system can be made entirely free from the risk of toll fraud, diligent attention to system security can reduce that risk considerably. MASS devotes substantial resources to detect suspicious calling patterns, alert…
Read more

Security Guide for Cisco Unity Connection

Preventing Toll Fraud in Cisco Unity Connection 8.x In this chapter, you will find a description of toll fraud—a potential security issue in any organization. You will also find information that may help you to develop preventive measures, and best practices to avoid toll fraud. See the following sections: •Using Restriction Tables to Help Prevent Toll…
Read more

Toll Fraud: A Network And Security Threat

Recently I asked this question as it became a front-of-mind topic of discussion around my peers, colleagues, and clients and it appears toll-fraud is still one of the largest IT security threats many c-level execs haven’t heard of, or don’t pay much attention to. How did toll-fraud become a network security threat? Allow me to…
Read more

Telecommunications | Voice | Data | Networking | Support