Click here to close now.




















Welcome!

News Feed Item

Industry Momentum Builds Against Telephone-Based Exploits as Second M3AAWG Voice and Telephony Anti-Abuse Workshop Announced

SAN FRANCISCO, CA -- (Marketwired) -- 05/20/14 -- Building on the growing industry cooperation against Internet-enabled voice threats such as robocalls, "swatting" extortion schemes and other safety concerns, the second Voice and Telephony Anti-Abuse Workshop hosted by the Messaging, Malware and Mobile Anti-Abuse Working Group will be held June 18-19 in Montreal, Canada. The two-day meeting is open to vetted professionals from industry, government and academia and will drill deeper into workable solutions to stop the types of sophisticated exploits made possible by the convergence of online and telephony technologies.

The workshop will delve into honeypot and trace back programs, call blocking policies, abuse reporting, and the global aspects of the problem, among other topics. It is the next step in an industry-wide initiative kicked off at a workshop last February in San Francisco to develop technical best practices defining useful methods to block abuse and identify the most effective public policies to mitigate its spread.

While the technological convergence of the Internet and telephony have given us widely-adopted services such as Voice over IP, it also has opened the door to spammers and criminals who easily take advantage of the accessibility and anonymity of these services to perpetuate fraud and carry out other menacing activities. More than just annoying telemarketing robocalls, telephony abuse is disrupting text, voice, video call and messaging services at an escalating rate, as explained in a video (http://www.youtube.com/watch?v=o1AnobOzXpM&feature=share&list=UUTZxk2zHaimn_zuWPgXV9cA) from the M3AAWG Voice and Telephone Special Interest Group, which has hosted both workshops.

"We're seeing serious exploits endangering public safety, such as swatting extortion schemes that overload emergency call centers and prevent legitimate calls from getting through until the demanded ransom is paid. Online criminals have quietly moved from simple 'phone spam' to deploying sophisticated systems integrating robodials, text messages, email, voice response, boiler rooms, even Web attack vectors. Because the abuse involves so many types of technology, it takes experts in all these areas working with public policy specialists to craft a solution that can protect end-users," said Alex Bobotek M3AAWG VTA SIG co-chair and vice chairman, board of directors.

The first telephony anti-abuse workshop focused on understanding the depth and scope of the problem. It brought together 90 participants, including technical experts, academic researchers, public policy advisors and representatives from government and law enforcement.

The upcoming second Voice and Telephony Anti-Abuse Workshop is also open to all professionals from services connected to the global public telecommunications network that use telephone numbers as a primary endpoint address. Academic researchers and public policy specialists working in the area are also invited. More information and a Request to Attend form is available on the M3AAWG website at http://www.m3aawg.org/vta-sig.

The M3AAWG VTA SIG is also hosting a working session on telephony abuse at the M3AAWG 31st General Meeting, to be held in Brussels on June 9-12, where it will share the results from the first workshop with the European community and solicit feedback. The annual European M3AAWG meeting will feature over 35 sessions on technical and public policy issues related to fighting abuse on all platforms.

About the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG)

The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) is where the industry comes together to work against bots, malware, spam, viruses, denial-of-service attacks and other online exploitation. M3AAWG (www.M3AAWG.org) represents more than one billion mailboxes from some of the largest network operators worldwide. It leverages the depth and experience of its global membership to tackle abuse on existing networks and new emerging services through technology, collaboration and public policy. It also works to educate global policy makers on the technical and operational issues related to online abuse and messaging. Headquartered in San Francisco, Calif., M3AAWG is driven by market needs and supported by major network operators and messaging providers.

M3AAWG Board of Directors: AT&T (NYSE: T); CenturyLink (NYSE: CTL); Cloudmark, Inc.; Comcast (NASDAQ: CMCSA); Constant Contact (NASDAQ: CTCT); Cox Communications; Damballa, Inc.; Facebook; Google; LinkedIn; Mailchimp; Orange (NYSE and Euronext: ORA); PayPal; Return Path; Time Warner Cable; Verizon Communications; and Yahoo! Inc.

M3AAWG Full Members: 1&1 Internet AG; Adobe Systems Inc.; AOL; BAE Systems Detica; Cablevision Systems Inc.; Campaign Monitor Pty.; Cisco Systems, Inc.; CloudFlare; Dynamic Network Services Inc.; iContact; Internet Initiative Japan (IIJ, NASDAQ: IIJI); Litmus; McAfee Inc.; Message Bus; Mimecast; Nominum, Inc.; Oracle/Eloqua; Proofpoint; Scality; Spamhaus; Sprint; Symantec and Twitter.

A complete member list is available at http://www.m3aawg.org/about/roster.

Embedded Video Available

Embedded Video Available: http://www2.marketwire.com/mw/frame_mw?attachid=2598103

Media Contact:
Linda Marcus, APR
1+714-974-6356 (U.S. Pacific)
Email Contact
Astra Communications

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
"We've just seen a huge influx of new partners coming into our ecosystem, and partners building unique offerings on top of our API set," explained Seth Bostock, Chief Executive Officer at IndependenceIT, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Chuck Piluso presented a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Prior to Secure Infrastructure and Services, Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of International Te...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobi...
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
For IoT to grow as quickly as analyst firms’ project, a lot is going to fall on developers to quickly bring applications to market. But the lack of a standard development platform threatens to slow growth and make application development more time consuming and costly, much like we’ve seen in the mobile space. In his session at @ThingsExpo, Mike Weiner, Product Manager of the Omega DevCloud with KORE Telematics Inc., discussed the evolving requirements for developers as IoT matures and conducte...
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, analyzed a range of cloud offerings (IaaS, PaaS, SaaS) and discussed the benefits/challenges of migrating to each offe...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
In their session at 17th Cloud Expo, Hal Schwartz, CEO of Secure Infrastructure & Services (SIAS), and Chuck Paolillo, CTO of Secure Infrastructure & Services (SIAS), provide a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. In his role as CEO of Secure Infrastructure & Services (SIAS), Hal Schwartz provides leadership and direction for the company.
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprecedented opportunities to improve business and government operations, decision making and mission support capabilities.