Lifecycle of a Phone Fraudster: Exposing Fraud Activity From Reconnaissance to Takeover Using Graph Analysis and Acoustical Anomalies

Provided by: SecurityTube.net
Topic: Security
Format: Webcast
Enterprises are vulnerable to \"Human hacking\", the effective social engineering of employees, contractors, and other trusted persons. In particular, financial institutions have seen a significant increase in account takeover attacks over the phone by sophisticated fraudsters socially engineering call center agents.

Find By Topic