Welcome!

News Feed Item

Industry Momentum Builds Against Telephone-Based Exploits as Second M3AAWG Voice and Telephony Anti-Abuse Workshop Announced

SAN FRANCISCO, CA -- (Marketwired) -- 05/20/14 -- Building on the growing industry cooperation against Internet-enabled voice threats such as robocalls, "swatting" extortion schemes and other safety concerns, the second Voice and Telephony Anti-Abuse Workshop hosted by the Messaging, Malware and Mobile Anti-Abuse Working Group will be held June 18-19 in Montreal, Canada. The two-day meeting is open to vetted professionals from industry, government and academia and will drill deeper into workable solutions to stop the types of sophisticated exploits made possible by the convergence of online and telephony technologies.

The workshop will delve into honeypot and trace back programs, call blocking policies, abuse reporting, and the global aspects of the problem, among other topics. It is the next step in an industry-wide initiative kicked off at a workshop last February in San Francisco to develop technical best practices defining useful methods to block abuse and identify the most effective public policies to mitigate its spread.

While the technological convergence of the Internet and telephony have given us widely-adopted services such as Voice over IP, it also has opened the door to spammers and criminals who easily take advantage of the accessibility and anonymity of these services to perpetuate fraud and carry out other menacing activities. More than just annoying telemarketing robocalls, telephony abuse is disrupting text, voice, video call and messaging services at an escalating rate, as explained in a video (http://www.youtube.com/watch?v=o1AnobOzXpM&feature=share&list=UUTZxk2zHaimn_zuWPgXV9cA) from the M3AAWG Voice and Telephone Special Interest Group, which has hosted both workshops.

"We're seeing serious exploits endangering public safety, such as swatting extortion schemes that overload emergency call centers and prevent legitimate calls from getting through until the demanded ransom is paid. Online criminals have quietly moved from simple 'phone spam' to deploying sophisticated systems integrating robodials, text messages, email, voice response, boiler rooms, even Web attack vectors. Because the abuse involves so many types of technology, it takes experts in all these areas working with public policy specialists to craft a solution that can protect end-users," said Alex Bobotek M3AAWG VTA SIG co-chair and vice chairman, board of directors.

The first telephony anti-abuse workshop focused on understanding the depth and scope of the problem. It brought together 90 participants, including technical experts, academic researchers, public policy advisors and representatives from government and law enforcement.

The upcoming second Voice and Telephony Anti-Abuse Workshop is also open to all professionals from services connected to the global public telecommunications network that use telephone numbers as a primary endpoint address. Academic researchers and public policy specialists working in the area are also invited. More information and a Request to Attend form is available on the M3AAWG website at http://www.m3aawg.org/vta-sig.

The M3AAWG VTA SIG is also hosting a working session on telephony abuse at the M3AAWG 31st General Meeting, to be held in Brussels on June 9-12, where it will share the results from the first workshop with the European community and solicit feedback. The annual European M3AAWG meeting will feature over 35 sessions on technical and public policy issues related to fighting abuse on all platforms.

About the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG)

The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) is where the industry comes together to work against bots, malware, spam, viruses, denial-of-service attacks and other online exploitation. M3AAWG (www.M3AAWG.org) represents more than one billion mailboxes from some of the largest network operators worldwide. It leverages the depth and experience of its global membership to tackle abuse on existing networks and new emerging services through technology, collaboration and public policy. It also works to educate global policy makers on the technical and operational issues related to online abuse and messaging. Headquartered in San Francisco, Calif., M3AAWG is driven by market needs and supported by major network operators and messaging providers.

M3AAWG Board of Directors: AT&T (NYSE: T); CenturyLink (NYSE: CTL); Cloudmark, Inc.; Comcast (NASDAQ: CMCSA); Constant Contact (NASDAQ: CTCT); Cox Communications; Damballa, Inc.; Facebook; Google; LinkedIn; Mailchimp; Orange (NYSE and Euronext: ORA); PayPal; Return Path; Time Warner Cable; Verizon Communications; and Yahoo! Inc.

M3AAWG Full Members: 1&1 Internet AG; Adobe Systems Inc.; AOL; BAE Systems Detica; Cablevision Systems Inc.; Campaign Monitor Pty.; Cisco Systems, Inc.; CloudFlare; Dynamic Network Services Inc.; iContact; Internet Initiative Japan (IIJ, NASDAQ: IIJI); Litmus; McAfee Inc.; Message Bus; Mimecast; Nominum, Inc.; Oracle/Eloqua; Proofpoint; Scality; Spamhaus; Sprint; Symantec and Twitter.

A complete member list is available at http://www.m3aawg.org/about/roster.

Embedded Video Available

Embedded Video Available: http://www2.marketwire.com/mw/frame_mw?attachid=2598103

Media Contact:
Linda Marcus, APR
1+714-974-6356 (U.S. Pacific)
Email Contact
Astra Communications

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.