SlideShare a Scribd company logo
1 of 28
3G Dialers

A New Demon with an Old Scan

Sao Paulo – May 12, 2010




Telefonica Empresas Spain
Leonardo Amor
01
New solutions – Old problems




Telefónica Empresas Spain   2
Security Services
Most used 3G devices to get online




Telefónica Empresas Spain   3
Security Services
Old School RTB devices




Telefónica Empresas Spain   4
Security Services
New Solutions – Old problems

  HSDPA 3G USB Tech specs:                        V.90 Modem PCI Technical details:




  Up to 7.2 / 21 Mbps                             Up to 56 Kbps
  USB 2.0                                         PCI
                                                   Extra bonus:
  Extra bonus:                                      • Beep, beep, beep melody
       • Can warns your hands in a cold day
                                    Both MODEMS
Telefónica Empresas Spain                     5
Security Services
02
Landscape




Telefónica Empresas Spain   6
Security Services
New Mobile Devices

 First 3G Routers (lack of WPA security)




Telefónica Empresas Spain              7
Security Services
Heterogenous OS




Telefónica Empresas Spain   8
Security Services
Internet access




                            Source: ITU World Telecommunication/ICT Indicators Database.

Telefónica Empresas Spain                                9
Security Services
Mobile users




                            Source: ITU World Telecommunication/ICT Indicators Database.

Telefónica Empresas Spain                                10
Security Services
03
The 3G abuse story




Telefónica Empresas Spain   11
Security Services
Monitoring VS Inspection


 We DO NOT inspect the content




Telefónica Empresas Spain   12
Security Services
Monitoring VS Inspection


 We DO NOT inspect the content
 Just monitor the
         traffic flows             .




Telefónica Empresas Spain   13
Security Services
Alarms


 2.009
 Start getting alarms for traffic to
  suspicius Premium numbers from
  3G devices.
 This monitor sensor was originally
  setup with RTB on mind or fix
  phone lines.



             ›   800 234 +++
             ›   645 +++ 324
             ›   +52 244 962 +++
             ›   423 234 +++



Telefónica Empresas Spain              14
Security Services
Sources

 Monitor Sensors
 Our Customers help desk
 Abuse Complains
 Third parties services
       • IP reputation




Telefónica Empresas Spain   15
Security Services
Abuse Group




 What kind of Abuses receive Telefonica?
       • Most of the time propetary formats, later some ARF and not IODEF at all
       • Please, send your complains, use an standard format.
Telefónica Empresas Spain                    16
Security Services
Modem 3G problems -- User Experience




Telefónica Empresas Spain   17
Security Services
Countermeasures
 Countermeasures




Telefónica Empresas Spain   18
Security Services
3G User Experience




Telefónica Empresas Spain   19
Security Services
04
The Proposal




Telefónica Empresas Spain   20
Security Services
Creation of a new Working Group




 To determinate major security risk related to each Mobile devices
       • Phishing , Malware, Fraud, Identity Thief, brand abuse, etc..
 Alliances and Collaboration
Telefónica Empresas Spain                      21
Security Services
05
Conclusions




Telefónica Empresas Spain   22
Security Services
If Internet would be a         Today
          river …..




Telefónica Empresas Spain   23
Security Services
APWG is doing a good work …
                            • Let’s help the industry to do not fail in old
                            problems
                            • Come on, together we can recover the river!




Telefónica Empresas Spain       24
Security Services
Tomorrow




Telefónica Empresas Spain   25
Security Services
If Internet would be a river, Operators will distribute
 water




   Actual distribution      Optimal           Value Services
Telefónica Empresas Spain     26
Security Services
Security from the network
                             The network as an active security element


   Clean internet access                 Clean VPN access                Clean users

       SECURITY FOR                      SECURITY FOR              SECURITY FOR LAN
      ACCESING PUBLIC                    VIRTUAL PRIVATE              & ENDPOINT
         NETWORKS                           NETWORKS




                            CLEAN                     CLEAN                            CLEAN
                            PIPES                     CLOUD                            USERS



                                Global security & point 2 point
Telefónica Empresas Spain                        27
Security Services
3G Dialers, A New Demon with an Old Scan

More Related Content

What's hot

DWS16 - Mobile networks forum - Laurent Fournier, Qualcomm
DWS16 - Mobile networks forum - Laurent Fournier, QualcommDWS16 - Mobile networks forum - Laurent Fournier, Qualcomm
DWS16 - Mobile networks forum - Laurent Fournier, QualcommIDATE DigiWorld
 
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyCagdas Tanriover
 
Wireless World
Wireless World Wireless World
Wireless World bhattsipl
 
LoRa by KPN - brochure
LoRa by KPN - brochureLoRa by KPN - brochure
LoRa by KPN - brochureKPN IoT
 
VISIONng - An introduction to +87810 UPT
VISIONng - An introduction to +87810 UPTVISIONng - An introduction to +87810 UPT
VISIONng - An introduction to +87810 UPTDerek Seddon
 
Io t lora sagemcom - feedback from the field - v1-04072017
Io t lora   sagemcom - feedback from the field - v1-04072017Io t lora   sagemcom - feedback from the field - v1-04072017
Io t lora sagemcom - feedback from the field - v1-04072017Thierry Lestable
 
LTE-M - LTE for Machines
LTE-M - LTE for MachinesLTE-M - LTE for Machines
LTE-M - LTE for MachinesNicolas Damour
 
LoRathon XS - presentatie Sodaq Jan Willem Smeenk
LoRathon XS - presentatie Sodaq Jan Willem SmeenkLoRathon XS - presentatie Sodaq Jan Willem Smeenk
LoRathon XS - presentatie Sodaq Jan Willem SmeenkHilversum Media Campus
 
Global Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorsGlobal Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorspaul young cpa, cga
 
NXP presentation at Secure Identifications 2016
NXP presentation at Secure Identifications 2016NXP presentation at Secure Identifications 2016
NXP presentation at Secure Identifications 2016Ihar Bayarenka
 

What's hot (15)

EENA 2021: industry session by CSAM Carmenta Public Safety - Public safety g...
EENA 2021: industry session by CSAM Carmenta Public Safety -  Public safety g...EENA 2021: industry session by CSAM Carmenta Public Safety -  Public safety g...
EENA 2021: industry session by CSAM Carmenta Public Safety - Public safety g...
 
DWS16 - Mobile networks forum - Laurent Fournier, Qualcomm
DWS16 - Mobile networks forum - Laurent Fournier, QualcommDWS16 - Mobile networks forum - Laurent Fournier, Qualcomm
DWS16 - Mobile networks forum - Laurent Fournier, Qualcomm
 
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product Family
 
Wireless World
Wireless World Wireless World
Wireless World
 
LoRa by KPN - brochure
LoRa by KPN - brochureLoRa by KPN - brochure
LoRa by KPN - brochure
 
VISIONng - An introduction to +87810 UPT
VISIONng - An introduction to +87810 UPTVISIONng - An introduction to +87810 UPT
VISIONng - An introduction to +87810 UPT
 
Io t lora sagemcom - feedback from the field - v1-04072017
Io t lora   sagemcom - feedback from the field - v1-04072017Io t lora   sagemcom - feedback from the field - v1-04072017
Io t lora sagemcom - feedback from the field - v1-04072017
 
LTE-M - LTE for Machines
LTE-M - LTE for MachinesLTE-M - LTE for Machines
LTE-M - LTE for Machines
 
LoRathon XS - presentatie Sodaq Jan Willem Smeenk
LoRathon XS - presentatie Sodaq Jan Willem SmeenkLoRathon XS - presentatie Sodaq Jan Willem Smeenk
LoRathon XS - presentatie Sodaq Jan Willem Smeenk
 
Global Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorsGlobal Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendors
 
Wi fi
Wi fiWi fi
Wi fi
 
Next Generation eCall (1/3)
Next Generation eCall (1/3)Next Generation eCall (1/3)
Next Generation eCall (1/3)
 
EENA2019: Track3 session1 How to deploy a Next Generation Platform today_Luca...
EENA2019: Track3 session1 How to deploy a Next Generation Platform today_Luca...EENA2019: Track3 session1 How to deploy a Next Generation Platform today_Luca...
EENA2019: Track3 session1 How to deploy a Next Generation Platform today_Luca...
 
ViViD
ViViDViViD
ViViD
 
NXP presentation at Secure Identifications 2016
NXP presentation at Secure Identifications 2016NXP presentation at Secure Identifications 2016
NXP presentation at Secure Identifications 2016
 

Viewers also liked

The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux
The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux
The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux Ryan Thurman
 
CyberLab CCEH Session - 10 Denial of Service
CyberLab CCEH Session - 10 Denial of ServiceCyberLab CCEH Session - 10 Denial of Service
CyberLab CCEH Session - 10 Denial of ServiceCyberLab
 
Adware
AdwareAdware
Adwarefovi96
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareAmit Serper
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3bfovi96
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareCyphort
 
Ce hv6 module 14 denial of service TH3 professional security
Ce hv6 module 14 denial of service TH3 professional securityCe hv6 module 14 denial of service TH3 professional security
Ce hv6 module 14 denial of service TH3 professional securitydefquon
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceAvirot Mitamura
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Super Effective Denial of Service Attacks
Super Effective Denial of Service AttacksSuper Effective Denial of Service Attacks
Super Effective Denial of Service AttacksJan Seidl
 
Phishing
PhishingPhishing
Phishingdefquon
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 

Viewers also liked (20)

The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux
The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux
The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux
 
Network security
Network securityNetwork security
Network security
 
How predictive dialers work
How predictive dialers workHow predictive dialers work
How predictive dialers work
 
CyberLab CCEH Session - 10 Denial of Service
CyberLab CCEH Session - 10 Denial of ServiceCyberLab CCEH Session - 10 Denial of Service
CyberLab CCEH Session - 10 Denial of Service
 
Adware
AdwareAdware
Adware
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adware
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3b
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adware
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
Ce hv6 module 14 denial of service TH3 professional security
Ce hv6 module 14 denial of service TH3 professional securityCe hv6 module 14 denial of service TH3 professional security
Ce hv6 module 14 denial of service TH3 professional security
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Super Effective Denial of Service Attacks
Super Effective Denial of Service AttacksSuper Effective Denial of Service Attacks
Super Effective Denial of Service Attacks
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
spyware
spywarespyware
spyware
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 

Similar to 3G Dialers, A New Demon with an Old Scan

OSGi in Consumer Electronics and Connected Homes - M Ossel
OSGi in Consumer Electronics and Connected Homes - M OsselOSGi in Consumer Electronics and Connected Homes - M Ossel
OSGi in Consumer Electronics and Connected Homes - M Osselmfrancis
 
Bioaccez - RFID adgangskort for kontrol og lokation
Bioaccez - RFID adgangskort for kontrol og lokationBioaccez - RFID adgangskort for kontrol og lokation
Bioaccez - RFID adgangskort for kontrol og lokationBioaccez Controls
 
T Vs Everywhere Telco Asia 2010
T Vs Everywhere Telco Asia 2010T Vs Everywhere Telco Asia 2010
T Vs Everywhere Telco Asia 2010miguelvinagre
 
Ixia Customer Presentation
Ixia Customer PresentationIxia Customer Presentation
Ixia Customer PresentationGilles Lejeune
 
Interxion At A Glance
Interxion At A GlanceInterxion At A Glance
Interxion At A Glancemcconnells32
 
Broadband presentation
Broadband presentationBroadband presentation
Broadband presentationJonesAmy5
 
Buckle Up for Safety: Telecom Ready for the Passing Lane
Buckle Up for Safety:  Telecom Ready for the Passing LaneBuckle Up for Safety:  Telecom Ready for the Passing Lane
Buckle Up for Safety: Telecom Ready for the Passing LaneMaRS Discovery District
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeAndrew Blades
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityThibault Cantegrel
 
Business is going too far too fast, my ict infrastructure can't follow!
Business is going too far too fast, my ict infrastructure can't follow!Business is going too far too fast, my ict infrastructure can't follow!
Business is going too far too fast, my ict infrastructure can't follow!L'Atelier BNP Paribas
 
Wireless industrial alarm adapter solution overview - q42015
Wireless industrial alarm adapter   solution overview - q42015Wireless industrial alarm adapter   solution overview - q42015
Wireless industrial alarm adapter solution overview - q42015stumanley
 
RFID Offering From SIPL
RFID Offering From SIPLRFID Offering From SIPL
RFID Offering From SIPLbhattsipl
 
Differentiating Your Telecom Cloud
Differentiating Your Telecom CloudDifferentiating Your Telecom Cloud
Differentiating Your Telecom CloudEduardo Mendez Polo
 

Similar to 3G Dialers, A New Demon with an Old Scan (20)

OSGi in Consumer Electronics and Connected Homes - M Ossel
OSGi in Consumer Electronics and Connected Homes - M OsselOSGi in Consumer Electronics and Connected Homes - M Ossel
OSGi in Consumer Electronics and Connected Homes - M Ossel
 
Bioaccez - RFID adgangskort for kontrol og lokation
Bioaccez - RFID adgangskort for kontrol og lokationBioaccez - RFID adgangskort for kontrol og lokation
Bioaccez - RFID adgangskort for kontrol og lokation
 
T Vs Everywhere Telco Asia 2010
T Vs Everywhere Telco Asia 2010T Vs Everywhere Telco Asia 2010
T Vs Everywhere Telco Asia 2010
 
Ixia Customer Presentation
Ixia Customer PresentationIxia Customer Presentation
Ixia Customer Presentation
 
Simon Trist - Arqiva SigFox
Simon Trist - Arqiva SigFoxSimon Trist - Arqiva SigFox
Simon Trist - Arqiva SigFox
 
Interxion At A Glance
Interxion At A GlanceInterxion At A Glance
Interxion At A Glance
 
Broadband presentation
Broadband presentationBroadband presentation
Broadband presentation
 
Bretagne at Mobile World Congress
Bretagne at Mobile World CongressBretagne at Mobile World Congress
Bretagne at Mobile World Congress
 
Buckle Up for Safety: Telecom Ready for the Passing Lane
Buckle Up for Safety:  Telecom Ready for the Passing LaneBuckle Up for Safety:  Telecom Ready for the Passing Lane
Buckle Up for Safety: Telecom Ready for the Passing Lane
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT Landscape
 
מכון היצוא - מצגת ענפים טכנולוגיים 2011
מכון היצוא - מצגת ענפים טכנולוגיים 2011מכון היצוא - מצגת ענפים טכנולוגיים 2011
מכון היצוא - מצגת ענפים טכנולוגיים 2011
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivity
 
A7 cloud orange
A7 cloud orangeA7 cloud orange
A7 cloud orange
 
Business is going too far too fast, my ict infrastructure can't follow!
Business is going too far too fast, my ict infrastructure can't follow!Business is going too far too fast, my ict infrastructure can't follow!
Business is going too far too fast, my ict infrastructure can't follow!
 
Wireless industrial alarm adapter solution overview - q42015
Wireless industrial alarm adapter   solution overview - q42015Wireless industrial alarm adapter   solution overview - q42015
Wireless industrial alarm adapter solution overview - q42015
 
La Bretagne au Mobile World Congress 2014
La Bretagne au Mobile World Congress 2014La Bretagne au Mobile World Congress 2014
La Bretagne au Mobile World Congress 2014
 
RFID Offering From SIPL
RFID Offering From SIPLRFID Offering From SIPL
RFID Offering From SIPL
 
EENA2019: Track1 session1 Citizens' needs, cloud and IP technology (...)_Guil...
EENA2019: Track1 session1 Citizens' needs, cloud and IP technology (...)_Guil...EENA2019: Track1 session1 Citizens' needs, cloud and IP technology (...)_Guil...
EENA2019: Track1 session1 Citizens' needs, cloud and IP technology (...)_Guil...
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
Differentiating Your Telecom Cloud
Differentiating Your Telecom CloudDifferentiating Your Telecom Cloud
Differentiating Your Telecom Cloud
 

More from Leonardo Amor

Sinfonier Storm Builder for Security Intelligence
Sinfonier Storm Builder for Security IntelligenceSinfonier Storm Builder for Security Intelligence
Sinfonier Storm Builder for Security IntelligenceLeonardo Amor
 
Join the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile appsJoin the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile appsLeonardo Amor
 
Be More Dog, Enise 2013
Be More Dog, Enise 2013Be More Dog, Enise 2013
Be More Dog, Enise 2013Leonardo Amor
 
Managed Security Services as a Formula1 race
Managed Security Services as a Formula1 raceManaged Security Services as a Formula1 race
Managed Security Services as a Formula1 raceLeonardo Amor
 
Ya están dentro ¿y Ahora qué?
Ya están dentro ¿y Ahora qué?Ya están dentro ¿y Ahora qué?
Ya están dentro ¿y Ahora qué?Leonardo Amor
 
Proteccion moviles Monterrey
Proteccion moviles MonterreyProteccion moviles Monterrey
Proteccion moviles MonterreyLeonardo Amor
 
Protege tu empresa en la era Wikileaks
Protege tu empresa en la era WikileaksProtege tu empresa en la era Wikileaks
Protege tu empresa en la era WikileaksLeonardo Amor
 
El papel de la seguridad en la era PostPc
El papel de la seguridad en la era PostPcEl papel de la seguridad en la era PostPc
El papel de la seguridad en la era PostPcLeonardo Amor
 
Protege los dispositivos móviles de tu empresa
Protege los dispositivos móviles de tu empresaProtege los dispositivos móviles de tu empresa
Protege los dispositivos móviles de tu empresaLeonardo Amor
 
Think Local, Be Global
Think Local, Be GlobalThink Local, Be Global
Think Local, Be GlobalLeonardo Amor
 

More from Leonardo Amor (10)

Sinfonier Storm Builder for Security Intelligence
Sinfonier Storm Builder for Security IntelligenceSinfonier Storm Builder for Security Intelligence
Sinfonier Storm Builder for Security Intelligence
 
Join the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile appsJoin the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile apps
 
Be More Dog, Enise 2013
Be More Dog, Enise 2013Be More Dog, Enise 2013
Be More Dog, Enise 2013
 
Managed Security Services as a Formula1 race
Managed Security Services as a Formula1 raceManaged Security Services as a Formula1 race
Managed Security Services as a Formula1 race
 
Ya están dentro ¿y Ahora qué?
Ya están dentro ¿y Ahora qué?Ya están dentro ¿y Ahora qué?
Ya están dentro ¿y Ahora qué?
 
Proteccion moviles Monterrey
Proteccion moviles MonterreyProteccion moviles Monterrey
Proteccion moviles Monterrey
 
Protege tu empresa en la era Wikileaks
Protege tu empresa en la era WikileaksProtege tu empresa en la era Wikileaks
Protege tu empresa en la era Wikileaks
 
El papel de la seguridad en la era PostPc
El papel de la seguridad en la era PostPcEl papel de la seguridad en la era PostPc
El papel de la seguridad en la era PostPc
 
Protege los dispositivos móviles de tu empresa
Protege los dispositivos móviles de tu empresaProtege los dispositivos móviles de tu empresa
Protege los dispositivos móviles de tu empresa
 
Think Local, Be Global
Think Local, Be GlobalThink Local, Be Global
Think Local, Be Global
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

3G Dialers, A New Demon with an Old Scan

  • 1. 3G Dialers A New Demon with an Old Scan Sao Paulo – May 12, 2010 Telefonica Empresas Spain Leonardo Amor
  • 2. 01 New solutions – Old problems Telefónica Empresas Spain 2 Security Services
  • 3. Most used 3G devices to get online Telefónica Empresas Spain 3 Security Services
  • 4. Old School RTB devices Telefónica Empresas Spain 4 Security Services
  • 5. New Solutions – Old problems  HSDPA 3G USB Tech specs:  V.90 Modem PCI Technical details:  Up to 7.2 / 21 Mbps  Up to 56 Kbps  USB 2.0  PCI  Extra bonus:  Extra bonus: • Beep, beep, beep melody • Can warns your hands in a cold day Both MODEMS Telefónica Empresas Spain 5 Security Services
  • 7. New Mobile Devices First 3G Routers (lack of WPA security) Telefónica Empresas Spain 7 Security Services
  • 8. Heterogenous OS Telefónica Empresas Spain 8 Security Services
  • 9. Internet access Source: ITU World Telecommunication/ICT Indicators Database. Telefónica Empresas Spain 9 Security Services
  • 10. Mobile users Source: ITU World Telecommunication/ICT Indicators Database. Telefónica Empresas Spain 10 Security Services
  • 11. 03 The 3G abuse story Telefónica Empresas Spain 11 Security Services
  • 12. Monitoring VS Inspection We DO NOT inspect the content Telefónica Empresas Spain 12 Security Services
  • 13. Monitoring VS Inspection We DO NOT inspect the content Just monitor the traffic flows . Telefónica Empresas Spain 13 Security Services
  • 14. Alarms 2.009 Start getting alarms for traffic to suspicius Premium numbers from 3G devices. This monitor sensor was originally setup with RTB on mind or fix phone lines. › 800 234 +++ › 645 +++ 324 › +52 244 962 +++ › 423 234 +++ Telefónica Empresas Spain 14 Security Services
  • 15. Sources Monitor Sensors Our Customers help desk Abuse Complains Third parties services • IP reputation Telefónica Empresas Spain 15 Security Services
  • 16. Abuse Group What kind of Abuses receive Telefonica? • Most of the time propetary formats, later some ARF and not IODEF at all • Please, send your complains, use an standard format. Telefónica Empresas Spain 16 Security Services
  • 17. Modem 3G problems -- User Experience Telefónica Empresas Spain 17 Security Services
  • 19. 3G User Experience Telefónica Empresas Spain 19 Security Services
  • 20. 04 The Proposal Telefónica Empresas Spain 20 Security Services
  • 21. Creation of a new Working Group To determinate major security risk related to each Mobile devices • Phishing , Malware, Fraud, Identity Thief, brand abuse, etc.. Alliances and Collaboration Telefónica Empresas Spain 21 Security Services
  • 23. If Internet would be a Today river ….. Telefónica Empresas Spain 23 Security Services
  • 24. APWG is doing a good work … • Let’s help the industry to do not fail in old problems • Come on, together we can recover the river! Telefónica Empresas Spain 24 Security Services
  • 25. Tomorrow Telefónica Empresas Spain 25 Security Services
  • 26. If Internet would be a river, Operators will distribute water Actual distribution Optimal Value Services Telefónica Empresas Spain 26 Security Services
  • 27. Security from the network The network as an active security element Clean internet access Clean VPN access Clean users SECURITY FOR SECURITY FOR SECURITY FOR LAN ACCESING PUBLIC VIRTUAL PRIVATE & ENDPOINT NETWORKS NETWORKS CLEAN CLEAN CLEAN PIPES CLOUD USERS Global security & point 2 point Telefónica Empresas Spain 27 Security Services