Click here to close now.

SYS-CON MEDIA Authors: Carmen Gonzalez, Plutora Blog, Liz McMillan, Elizabeth White, Peter Silva

News Feed Item

Industry Momentum Builds Against Telephone-Based Exploits as Second M3AAWG Voice and Telephony Anti-Abuse Workshop Announced

SAN FRANCISCO, CA -- (Marketwired) -- 05/20/14 -- Building on the growing industry cooperation against Internet-enabled voice threats such as robocalls, "swatting" extortion schemes and other safety concerns, the second Voice and Telephony Anti-Abuse Workshop hosted by the Messaging, Malware and Mobile Anti-Abuse Working Group will be held June 18-19 in Montreal, Canada. The two-day meeting is open to vetted professionals from industry, government and academia and will drill deeper into workable solutions to stop the types of sophisticated exploits made possible by the convergence of online and telephony technologies.

The workshop will delve into honeypot and trace back programs, call blocking policies, abuse reporting, and the global aspects of the problem, among other topics. It is the next step in an industry-wide initiative kicked off at a workshop last February in San Francisco to develop technical best practices defining useful methods to block abuse and identify the most effective public policies to mitigate its spread.

While the technological convergence of the Internet and telephony have given us widely-adopted services such as Voice over IP, it also has opened the door to spammers and criminals who easily take advantage of the accessibility and anonymity of these services to perpetuate fraud and carry out other menacing activities. More than just annoying telemarketing robocalls, telephony abuse is disrupting text, voice, video call and messaging services at an escalating rate, as explained in a video (http://www.youtube.com/watch?v=o1AnobOzXpM&feature=share&list=UUTZxk2zHaimn_zuWPgXV9cA) from the M3AAWG Voice and Telephone Special Interest Group, which has hosted both workshops.

"We're seeing serious exploits endangering public safety, such as swatting extortion schemes that overload emergency call centers and prevent legitimate calls from getting through until the demanded ransom is paid. Online criminals have quietly moved from simple 'phone spam' to deploying sophisticated systems integrating robodials, text messages, email, voice response, boiler rooms, even Web attack vectors. Because the abuse involves so many types of technology, it takes experts in all these areas working with public policy specialists to craft a solution that can protect end-users," said Alex Bobotek M3AAWG VTA SIG co-chair and vice chairman, board of directors.

The first telephony anti-abuse workshop focused on understanding the depth and scope of the problem. It brought together 90 participants, including technical experts, academic researchers, public policy advisors and representatives from government and law enforcement.

The upcoming second Voice and Telephony Anti-Abuse Workshop is also open to all professionals from services connected to the global public telecommunications network that use telephone numbers as a primary endpoint address. Academic researchers and public policy specialists working in the area are also invited. More information and a Request to Attend form is available on the M3AAWG website at http://www.m3aawg.org/vta-sig.

The M3AAWG VTA SIG is also hosting a working session on telephony abuse at the M3AAWG 31st General Meeting, to be held in Brussels on June 9-12, where it will share the results from the first workshop with the European community and solicit feedback. The annual European M3AAWG meeting will feature over 35 sessions on technical and public policy issues related to fighting abuse on all platforms.

About the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG)

The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) is where the industry comes together to work against bots, malware, spam, viruses, denial-of-service attacks and other online exploitation. M3AAWG (www.M3AAWG.org) represents more than one billion mailboxes from some of the largest network operators worldwide. It leverages the depth and experience of its global membership to tackle abuse on existing networks and new emerging services through technology, collaboration and public policy. It also works to educate global policy makers on the technical and operational issues related to online abuse and messaging. Headquartered in San Francisco, Calif., M3AAWG is driven by market needs and supported by major network operators and messaging providers.

M3AAWG Board of Directors: AT&T (NYSE: T); CenturyLink (NYSE: CTL); Cloudmark, Inc.; Comcast (NASDAQ: CMCSA); Constant Contact (NASDAQ: CTCT); Cox Communications; Damballa, Inc.; Facebook; Google; LinkedIn; Mailchimp; Orange (NYSE and Euronext: ORA); PayPal; Return Path; Time Warner Cable; Verizon Communications; and Yahoo! Inc.

M3AAWG Full Members: 1&1 Internet AG; Adobe Systems Inc.; AOL; BAE Systems Detica; Cablevision Systems Inc.; Campaign Monitor Pty.; Cisco Systems, Inc.; CloudFlare; Dynamic Network Services Inc.; iContact; Internet Initiative Japan (IIJ, NASDAQ: IIJI); Litmus; McAfee Inc.; Message Bus; Mimecast; Nominum, Inc.; Oracle/Eloqua; Proofpoint; Scality; Spamhaus; Sprint; Symantec and Twitter.

A complete member list is available at http://www.m3aawg.org/about/roster.

Embedded Video Available

Embedded Video Available: http://www2.marketwire.com/mw/frame_mw?attachid=2598103

Media Contact:
Linda Marcus, APR
1+714-974-6356 (U.S. Pacific)
Email Contact
Astra Communications

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Docker is an excellent platform for organizations interested in running microservices. It offers portability and consistency between development and production environments, quick provisioning times, and a simple way to isolate services. In his session at DevOps Summit at 16th Cloud Expo, Shannon Williams, co-founder of Rancher Labs, will walk through these and other benefits of using Docker to run microservices, and provide an overview of RancherOS, a minimalist distribution of Linux designed...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along...
The free version of KEMP Technologies' LoadMaster™ application load balancer is now available for unlimited use, making it easy for IT developers and open source technology users to benefit from all the features of a full commercial-grade product at no cost. It can be downloaded at FreeLoadBalancer.com. Load balancing, security and traffic optimization are all key enablers for application performance and functionality. Without these, application services will not perform as expected or have the...
SYS-CON Media announced that IBM, which offers the world’s deepest portfolio of technologies and expertise that are transforming the future of work, has launched ad campaigns on SYS-CON’s numerous online magazines such as Cloud Computing Journal, Virtualization Journal, SOA World Magazine, and IoT Journal. IBM’s campaigns focus on vendors in the technology marketplace, the future of testing, Big Data and analytics, and mobile platforms.
It’s been proven time and time again that in tech, diversity drives greater innovation, better team productivity and greater profits and market share. So what can we do in our DevOps teams to embrace diversity and help transform the culture of development and operations into a true “DevOps” team? In her session at DevOps Summit, Stefana Muller, Director, Product Management – Continuous Delivery at CA Technologies, will answer that question citing examples, showing how to create opportunities f...
JFrog on Thursday announced that it has added Docker support to Bintray, its distribution-as-a-service (DaaS) platform. When combined with JFrog’s Artifactory binary repository management system, organizations can now manage Docker images with an end-to-end solution that supports all technologies. The new version of Bintray allows organizations to create an unlimited number of private Docker repositories, and through the use of fast Akamai content delivery networks (CDNs), it decreases the dow...
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @Things...
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness,...
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add sc...
Business and IT leaders today need better application delivery capabilities to support critical new innovation. But how often do you hear objections to improving application delivery like, “I can harden it against attack, but not on this timeline”; “I can make it better, but it will cost more”; “I can deliver faster, but not with these specs”; or “I can stay strong on cost control, but quality will suffer”? In the new application economy, these tradeoffs are no longer acceptable. Customers will ...
Red Hat has launched the Red Hat Cloud Innovation Practice, a new global team of experts that will assist companies with more quickly on-ramping to the cloud. They will do this by providing solutions and services such as validated designs with reference architectures and agile methodology consulting, training, and support. The Red Hat Cloud Innovation Practice is born out of the integration of technology and engineering expertise gained through the company’s 2014 acquisitions of leading Ceph s...
Data-intensive companies that strive to gain insights from data using Big Data analytics tools can gain tremendous competitive advantage by deploying data-centric storage. Organizations generate large volumes of data, the vast majority of which is unstructured. As the volume and velocity of this unstructured data increases, the costs, risks and usability challenges associated with managing the unstructured data (regardless of file type, size or device) increases simultaneously, including end-to-...
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, includin...
Docker has acquired software-defined networking (SDN) startup SocketPlane. SocketPlane, which was founded in Q4, 2014, with a vision of delivering Docker-native networking, has been an active participant in shaping the initial efforts around Docker’s open API for networking. The explicit focus of the SocketPlane team within Docker will be on collaborating with the partner community to complete a rich set of networking APIs that addresses the needs of application developers and network and system...