Lifecycle of a Phone Fraudster: Exposing Fraud Activity From Reconnaissance to Takeover Using Graph Analysis and Acoustical Anomalies

Provided by: Topic: Security Date Added: Aug 2014 Format: Webcast
Enterprises are vulnerable to \"Human hacking\", the effective social engineering of employees, contractors, and other trusted persons. In particular, financial institutions have seen a significant increase in account takeover attacks over the phone by sophisticated fraudsters socially engineering call center agents.

Find By Topic