Summary

Voice phishing is on the same exponential path that spyware and traditional phishing have taken. These types of financially lucrative attacks typically follow the same growth curve; once the tools to facilitate exploitation are disseminated to the evildoers , there is typically a tipping point of several months whereby the attack starts to enter the mainstream (see Figure 15-5).

image from book
Figure 15-5: Voice phishing hits the mainstream.


Hacking Exposed VoIP. Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net