Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
Phreaking
This refers to telephone fraud where the victim is invariably the telephone company. Phreakers use a range of techniques such as phone card hacking to gain access to long distance networks without charge. With the more recent advent of VoIP and mobile networks, the focus of the phreakers has changed but still involves fraud and telephones.
Control Phreak From Wick Hill Assists in Preventing Toll Fraud
Phreaking is still widely misunderstood in the business community according to Wick Hill who recommends the use of such tools as Control Phreak from Callista to protect their VoIP networks from toll fra
Voice firewall for eliminating toll fraud
PABX hacking is a growing trend that can be fought using voice firewall software from Retell
Voice firewall to prevent phone system hacking
Sense Voice Firewall from Retell automatically disconnects unauthorised calls with potential savings being high due to increase in PABX "phreaking" incidents
Protecting data beyond the perimeter.
Jim Doherty of CipherOptics explains the importance of having data protection at the heart of an IT security strategy to prevent criminals gaining access to it after it has left the perimeter defences.
McAfee cyber crime study reveals increasing threat sophistication
McAfee predict increased incidences of fraudulent internet based activity during 2008 along with widespread use of cyber espionage by governments which may threaten national security.
McAfee forecasts malware trends for 2008
Instant messaging, web 2.0 and MS Vista seen as the predominant areas of increasing concerning for malware in 2008 according to McAfee combined with a welcome reduction in adware.
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo