Monday, January 18, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

AT&T, Comcast successfully test SHAKEN/STIR protocol for fighting robocalls

March 20, 2019
in Internet Security
AT&T, Comcast successfully test SHAKEN/STIR protocol for fighting robocalls
587
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

AT&T acquires cybersecurity company AlienVault
Fresh off of its $85 billion acquisition of Time Warner, AT&T said Tuesday that it’s buying AlienVault, a cybersecurity and threat intelligence company. Read more: https://zd.net/2N0e21x

AT&T and Comcast announced today that they’ve successfully tested what they believe to be the first SHAKEN/STIR-authenticated call between two different telecom networks.

You might also like

Phishing warning: These are the brands most likely to be impersonated by crooks, so stay alert

Trump ban: No ‘moment for celebration’ in the eyes of Twitter chief

Apple removes feature that allowed its apps to bypass macOS firewalls and VPNs

SHAKEN/STIR stands for Signature-based Handling of Asserted Information Using toKENs (SHAKEN) and the Secure Telephone Identity Revisited (STIR), and is a protocol for authenticating phone calls with the help of cryptographic certificates.

The protocol was created to address the problem of call spoofing –calls that claim to come from a number or network, but they don’t.

SHAKEN/STIR works by the network operator where the call has originated “signining” the call using a certificate. The telecom operator on the receiving end of the call can verify it came from the network the call claims it originated by looking at its certificate and making a few cryptographic checks.

SHAKEN/STIR protocol

Image: TransNexus

Work on the SHAKEN/STIR protocol has been underway for a while, and until now, several telecom operators have tested it already, but with calls inside their respective networks, where they could verify that everything was working as intended and calls were getting signed correctly when made, and verified the right way when received.

Today, AT&T and Comcast said they carried out the first SHAKEN/STIR call made between two different networks.

“The test used phones on the companies’ consumer networks – not in a lab or restricted to special equipment,” AT&T said in a press release. “It was conducted March 5, between AT&T Phone digital home service and Comcast’s Xfinity Voice home phone service.”

“The calls were successfully authenticated and verified using the SHAKEN/STIR protocol – believed to be an industry first for calls between separate providers,” the US telco said.

The US Federal Telecommunications Committee has been pushing for SHAKEN/STIR’s adoption and has imposed the end of 2019 as a hard deadline for networks implementing the protocol.

SHAKEN/STIR won’t help stop robocalls (spam phone calls) completely, but they will help networks and end users spot them easier.

Telcos will be able to mark calls that not have been SHAKEN/STIR-signed as suspicious and consumer will be able to act on these warnings and turn down calls.

Further, SHAKEN/STIR will also be useful in fighting other types of telephony-based fraud, which is estimated to have caused losses of around $38.1 billion to telcos and their consumers.

Related security coverage:

Credit: Source link

Previous Post

LLVM 8 shines on WebAssembly, machine learning workloads

Next Post

H2O.ai Accelerates Automatic ML with New NVIDIA-Powered Data Science

Related Posts

Phishing warning: These are the brands most likely to be impersonated by crooks, so stay alert
Internet Security

Phishing warning: These are the brands most likely to be impersonated by crooks, so stay alert

January 18, 2021
Trump ban: No ‘moment for celebration’ in the eyes of Twitter chief
Internet Security

Trump ban: No ‘moment for celebration’ in the eyes of Twitter chief

January 17, 2021
Apple removes feature that allowed its apps to bypass macOS firewalls and VPNs
Internet Security

Apple removes feature that allowed its apps to bypass macOS firewalls and VPNs

January 17, 2021
SolarWinds said no other products were compromised in recent hack
Internet Security

SolarWinds defense: How to stop similar attacks

January 17, 2021
Facebook sues two Chrome extension devs for scraping user data
Internet Security

Facebook sues two Chrome extension devs for scraping user data

January 17, 2021
Next Post
H2O.ai Accelerates Automatic ML with New NVIDIA-Powered Data Science

H2O.ai Accelerates Automatic ML with New NVIDIA-Powered Data Science

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Reading Multiple CSVs into Merged R Dataframe
Data Science

Reading Multiple CSVs into Merged R Dataframe

January 18, 2021
Machine Learning Models: Generative vs. Discriminative
Machine Learning

Machine Learning Models: Generative vs. Discriminative

January 18, 2021
Phishing warning: These are the brands most likely to be impersonated by crooks, so stay alert
Internet Security

Phishing warning: These are the brands most likely to be impersonated by crooks, so stay alert

January 18, 2021
Cloud Migration Planning & Checklist for Effective Migration
Data Science

Cloud Migration Planning & Checklist for Effective Migration

January 17, 2021
Forget coding, you can now solve your AI problems with Excel
Machine Learning

Forget coding, you can now solve your AI problems with Excel

January 17, 2021
Trump ban: No ‘moment for celebration’ in the eyes of Twitter chief
Internet Security

Trump ban: No ‘moment for celebration’ in the eyes of Twitter chief

January 17, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Reading Multiple CSVs into Merged R Dataframe January 18, 2021
  • Machine Learning Models: Generative vs. Discriminative January 18, 2021
  • Phishing warning: These are the brands most likely to be impersonated by crooks, so stay alert January 18, 2021
  • Cloud Migration Planning & Checklist for Effective Migration January 17, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates