SlideShare a Scribd company logo
1 of 28
3G Dialers

A New Demon with an Old Scan

Sao Paulo – May 12, 2010




Telefonica Empresas Spain
Leonardo Amor
01
New solutions – Old problems




Telefónica Empresas Spain   2
Security Services
Most used 3G devices to get online




Telefónica Empresas Spain   3
Security Services
Old School RTB devices




Telefónica Empresas Spain   4
Security Services
New Solutions – Old problems

  HSDPA 3G USB Tech specs:                        V.90 Modem PCI Technical details:




  Up to 7.2 / 21 Mbps                             Up to 56 Kbps
  USB 2.0                                         PCI
                                                   Extra bonus:
  Extra bonus:                                      • Beep, beep, beep melody
       • Can warns your hands in a cold day
                                    Both MODEMS
Telefónica Empresas Spain                     5
Security Services
02
Landscape




Telefónica Empresas Spain   6
Security Services
New Mobile Devices

 First 3G Routers (lack of WPA security)




Telefónica Empresas Spain              7
Security Services
Heterogenous OS




Telefónica Empresas Spain   8
Security Services
Internet access




                            Source: ITU World Telecommunication/ICT Indicators Database.

Telefónica Empresas Spain                                9
Security Services
Mobile users




                            Source: ITU World Telecommunication/ICT Indicators Database.

Telefónica Empresas Spain                                10
Security Services
03
The 3G abuse story




Telefónica Empresas Spain   11
Security Services
Monitoring VS Inspection


 We DO NOT inspect the content




Telefónica Empresas Spain   12
Security Services
Monitoring VS Inspection


 We DO NOT inspect the content
 Just monitor the
         traffic flows             .




Telefónica Empresas Spain   13
Security Services
Alarms


 2.009
 Start getting alarms for traffic to
  suspicius Premium numbers from
  3G devices.
 This monitor sensor was originally
  setup with RTB on mind or fix
  phone lines.



             ›   800 234 +++
             ›   645 +++ 324
             ›   +52 244 962 +++
             ›   423 234 +++



Telefónica Empresas Spain              14
Security Services
Sources

 Monitor Sensors
 Our Customers help desk
 Abuse Complains
 Third parties services
       • IP reputation




Telefónica Empresas Spain   15
Security Services
Abuse Group




 What kind of Abuses receive Telefonica?
       • Most of the time propetary formats, later some ARF and not IODEF at all
       • Please, send your complains, use an standard format.
Telefónica Empresas Spain                    16
Security Services
Modem 3G problems -- User Experience




Telefónica Empresas Spain   17
Security Services
Countermeasures
 Countermeasures




Telefónica Empresas Spain   18
Security Services
3G User Experience




Telefónica Empresas Spain   19
Security Services
04
The Proposal




Telefónica Empresas Spain   20
Security Services
Creation of a new Working Group




 To determinate major security risk related to each Mobile devices
       • Phishing , Malware, Fraud, Identity Thief, brand abuse, etc..
 Alliances and Collaboration
Telefónica Empresas Spain                      21
Security Services
05
Conclusions




Telefónica Empresas Spain   22
Security Services
If Internet would be a         Today
          river …..




Telefónica Empresas Spain   23
Security Services
APWG is doing a good work …
                            • Let’s help the industry to do not fail in old
                            problems
                            • Come on, together we can recover the river!




Telefónica Empresas Spain       24
Security Services
Tomorrow




Telefónica Empresas Spain   25
Security Services
If Internet would be a river, Operators will distribute
 water




   Actual distribution      Optimal           Value Services
Telefónica Empresas Spain     26
Security Services
Security from the network
                             The network as an active security element


   Clean internet access                 Clean VPN access                Clean users

       SECURITY FOR                      SECURITY FOR              SECURITY FOR LAN
      ACCESING PUBLIC                    VIRTUAL PRIVATE              & ENDPOINT
         NETWORKS                           NETWORKS




                            CLEAN                     CLEAN                            CLEAN
                            PIPES                     CLOUD                            USERS



                                Global security & point 2 point
Telefónica Empresas Spain                        27
Security Services
3G Dialers, A New Demon with an Old Scan

More Related Content

What's hot

DWS16 - Mobile networks forum - Laurent Fournier, Qualcomm
DWS16 - Mobile networks forum - Laurent Fournier, QualcommDWS16 - Mobile networks forum - Laurent Fournier, Qualcomm
DWS16 - Mobile networks forum - Laurent Fournier, QualcommIDATE DigiWorld
 
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyCagdas Tanriover
 
Wireless World
Wireless World Wireless World
Wireless World bhattsipl
 
LoRa by KPN - brochure
LoRa by KPN - brochureLoRa by KPN - brochure
LoRa by KPN - brochureKPN IoT
 
VISIONng - An introduction to +87810 UPT
VISIONng - An introduction to +87810 UPTVISIONng - An introduction to +87810 UPT
VISIONng - An introduction to +87810 UPTDerek Seddon
 
Io t lora sagemcom - feedback from the field - v1-04072017
Io t lora   sagemcom - feedback from the field - v1-04072017Io t lora   sagemcom - feedback from the field - v1-04072017
Io t lora sagemcom - feedback from the field - v1-04072017Thierry Lestable
 
LTE-M - LTE for Machines
LTE-M - LTE for MachinesLTE-M - LTE for Machines
LTE-M - LTE for MachinesNicolas Damour
 
LoRathon XS - presentatie Sodaq Jan Willem Smeenk
LoRathon XS - presentatie Sodaq Jan Willem SmeenkLoRathon XS - presentatie Sodaq Jan Willem Smeenk
LoRathon XS - presentatie Sodaq Jan Willem SmeenkHilversum Media Campus
 
Global Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorsGlobal Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorspaul young cpa, cga
 
NXP presentation at Secure Identifications 2016
NXP presentation at Secure Identifications 2016NXP presentation at Secure Identifications 2016
NXP presentation at Secure Identifications 2016Ihar Bayarenka
 

What's hot (15)

EENA 2021: industry session by CSAM Carmenta Public Safety - Public safety g...
EENA 2021: industry session by CSAM Carmenta Public Safety -  Public safety g...EENA 2021: industry session by CSAM Carmenta Public Safety -  Public safety g...
EENA 2021: industry session by CSAM Carmenta Public Safety - Public safety g...
 
DWS16 - Mobile networks forum - Laurent Fournier, Qualcomm
DWS16 - Mobile networks forum - Laurent Fournier, QualcommDWS16 - Mobile networks forum - Laurent Fournier, Qualcomm
DWS16 - Mobile networks forum - Laurent Fournier, Qualcomm
 
Netas Nova Cyber Security Product Family
Netas Nova Cyber Security Product FamilyNetas Nova Cyber Security Product Family
Netas Nova Cyber Security Product Family
 
Wireless World
Wireless World Wireless World
Wireless World
 
LoRa by KPN - brochure
LoRa by KPN - brochureLoRa by KPN - brochure
LoRa by KPN - brochure
 
VISIONng - An introduction to +87810 UPT
VISIONng - An introduction to +87810 UPTVISIONng - An introduction to +87810 UPT
VISIONng - An introduction to +87810 UPT
 
Io t lora sagemcom - feedback from the field - v1-04072017
Io t lora   sagemcom - feedback from the field - v1-04072017Io t lora   sagemcom - feedback from the field - v1-04072017
Io t lora sagemcom - feedback from the field - v1-04072017
 
LTE-M - LTE for Machines
LTE-M - LTE for MachinesLTE-M - LTE for Machines
LTE-M - LTE for Machines
 
LoRathon XS - presentatie Sodaq Jan Willem Smeenk
LoRathon XS - presentatie Sodaq Jan Willem SmeenkLoRathon XS - presentatie Sodaq Jan Willem Smeenk
LoRathon XS - presentatie Sodaq Jan Willem Smeenk
 
Global Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendorsGlobal Security threats from 5G leads to new selection of 5G vendors
Global Security threats from 5G leads to new selection of 5G vendors
 
Wi fi
Wi fiWi fi
Wi fi
 
Next Generation eCall (1/3)
Next Generation eCall (1/3)Next Generation eCall (1/3)
Next Generation eCall (1/3)
 
EENA2019: Track3 session1 How to deploy a Next Generation Platform today_Luca...
EENA2019: Track3 session1 How to deploy a Next Generation Platform today_Luca...EENA2019: Track3 session1 How to deploy a Next Generation Platform today_Luca...
EENA2019: Track3 session1 How to deploy a Next Generation Platform today_Luca...
 
ViViD
ViViDViViD
ViViD
 
NXP presentation at Secure Identifications 2016
NXP presentation at Secure Identifications 2016NXP presentation at Secure Identifications 2016
NXP presentation at Secure Identifications 2016
 

Viewers also liked

The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux
The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux
The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux Ryan Thurman
 
CyberLab CCEH Session - 10 Denial of Service
CyberLab CCEH Session - 10 Denial of ServiceCyberLab CCEH Session - 10 Denial of Service
CyberLab CCEH Session - 10 Denial of ServiceCyberLab
 
Adware
AdwareAdware
Adwarefovi96
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareAmit Serper
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3bfovi96
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareCyphort
 
Ce hv6 module 14 denial of service TH3 professional security
Ce hv6 module 14 denial of service TH3 professional securityCe hv6 module 14 denial of service TH3 professional security
Ce hv6 module 14 denial of service TH3 professional securitydefquon
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceAvirot Mitamura
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Super Effective Denial of Service Attacks
Super Effective Denial of Service AttacksSuper Effective Denial of Service Attacks
Super Effective Denial of Service AttacksJan Seidl
 
Phishing
PhishingPhishing
Phishingdefquon
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 

Viewers also liked (20)

The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux
The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux
The State of the TCPA: Consent, Dialers, the FCC -- the Law is in Flux
 
Network security
Network securityNetwork security
Network security
 
How predictive dialers work
How predictive dialers workHow predictive dialers work
How predictive dialers work
 
CyberLab CCEH Session - 10 Denial of Service
CyberLab CCEH Session - 10 Denial of ServiceCyberLab CCEH Session - 10 Denial of Service
CyberLab CCEH Session - 10 Denial of Service
 
Adware
AdwareAdware
Adware
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adware
 
Spyware 3b
Spyware 3bSpyware 3b
Spyware 3b
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adware
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
Ce hv6 module 14 denial of service TH3 professional security
Ce hv6 module 14 denial of service TH3 professional securityCe hv6 module 14 denial of service TH3 professional security
Ce hv6 module 14 denial of service TH3 professional security
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
CEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of ServiceCEH - Module 10 : Denial of Service
CEH - Module 10 : Denial of Service
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Super Effective Denial of Service Attacks
Super Effective Denial of Service AttacksSuper Effective Denial of Service Attacks
Super Effective Denial of Service Attacks
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
spyware
spywarespyware
spyware
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 

Similar to 3G Dialers, A New Demon with an Old Scan

OSGi in Consumer Electronics and Connected Homes - M Ossel
OSGi in Consumer Electronics and Connected Homes - M OsselOSGi in Consumer Electronics and Connected Homes - M Ossel
OSGi in Consumer Electronics and Connected Homes - M Osselmfrancis
 
Bioaccez - RFID adgangskort for kontrol og lokation
Bioaccez - RFID adgangskort for kontrol og lokationBioaccez - RFID adgangskort for kontrol og lokation
Bioaccez - RFID adgangskort for kontrol og lokationBioaccez Controls
 
T Vs Everywhere Telco Asia 2010
T Vs Everywhere Telco Asia 2010T Vs Everywhere Telco Asia 2010
T Vs Everywhere Telco Asia 2010miguelvinagre
 
Ixia Customer Presentation
Ixia Customer PresentationIxia Customer Presentation
Ixia Customer PresentationGilles Lejeune
 
Interxion At A Glance
Interxion At A GlanceInterxion At A Glance
Interxion At A Glancemcconnells32
 
Broadband presentation
Broadband presentationBroadband presentation
Broadband presentationJonesAmy5
 
Buckle Up for Safety: Telecom Ready for the Passing Lane
Buckle Up for Safety:  Telecom Ready for the Passing LaneBuckle Up for Safety:  Telecom Ready for the Passing Lane
Buckle Up for Safety: Telecom Ready for the Passing LaneMaRS Discovery District
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeAndrew Blades
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityThibault Cantegrel
 
Business is going too far too fast, my ict infrastructure can't follow!
Business is going too far too fast, my ict infrastructure can't follow!Business is going too far too fast, my ict infrastructure can't follow!
Business is going too far too fast, my ict infrastructure can't follow!L'Atelier BNP Paribas
 
Wireless industrial alarm adapter solution overview - q42015
Wireless industrial alarm adapter   solution overview - q42015Wireless industrial alarm adapter   solution overview - q42015
Wireless industrial alarm adapter solution overview - q42015stumanley
 
RFID Offering From SIPL
RFID Offering From SIPLRFID Offering From SIPL
RFID Offering From SIPLbhattsipl
 
Differentiating Your Telecom Cloud
Differentiating Your Telecom CloudDifferentiating Your Telecom Cloud
Differentiating Your Telecom CloudEduardo Mendez Polo
 

Similar to 3G Dialers, A New Demon with an Old Scan (20)

OSGi in Consumer Electronics and Connected Homes - M Ossel
OSGi in Consumer Electronics and Connected Homes - M OsselOSGi in Consumer Electronics and Connected Homes - M Ossel
OSGi in Consumer Electronics and Connected Homes - M Ossel
 
Bioaccez - RFID adgangskort for kontrol og lokation
Bioaccez - RFID adgangskort for kontrol og lokationBioaccez - RFID adgangskort for kontrol og lokation
Bioaccez - RFID adgangskort for kontrol og lokation
 
T Vs Everywhere Telco Asia 2010
T Vs Everywhere Telco Asia 2010T Vs Everywhere Telco Asia 2010
T Vs Everywhere Telco Asia 2010
 
Ixia Customer Presentation
Ixia Customer PresentationIxia Customer Presentation
Ixia Customer Presentation
 
Simon Trist - Arqiva SigFox
Simon Trist - Arqiva SigFoxSimon Trist - Arqiva SigFox
Simon Trist - Arqiva SigFox
 
Interxion At A Glance
Interxion At A GlanceInterxion At A Glance
Interxion At A Glance
 
Broadband presentation
Broadband presentationBroadband presentation
Broadband presentation
 
Bretagne at Mobile World Congress
Bretagne at Mobile World CongressBretagne at Mobile World Congress
Bretagne at Mobile World Congress
 
Buckle Up for Safety: Telecom Ready for the Passing Lane
Buckle Up for Safety:  Telecom Ready for the Passing LaneBuckle Up for Safety:  Telecom Ready for the Passing Lane
Buckle Up for Safety: Telecom Ready for the Passing Lane
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT Landscape
 
מכון היצוא - מצגת ענפים טכנולוגיים 2011
מכון היצוא - מצגת ענפים טכנולוגיים 2011מכון היצוא - מצגת ענפים טכנולוגיים 2011
מכון היצוא - מצגת ענפים טכנולוגיים 2011
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivity
 
A7 cloud orange
A7 cloud orangeA7 cloud orange
A7 cloud orange
 
Business is going too far too fast, my ict infrastructure can't follow!
Business is going too far too fast, my ict infrastructure can't follow!Business is going too far too fast, my ict infrastructure can't follow!
Business is going too far too fast, my ict infrastructure can't follow!
 
Wireless industrial alarm adapter solution overview - q42015
Wireless industrial alarm adapter   solution overview - q42015Wireless industrial alarm adapter   solution overview - q42015
Wireless industrial alarm adapter solution overview - q42015
 
La Bretagne au Mobile World Congress 2014
La Bretagne au Mobile World Congress 2014La Bretagne au Mobile World Congress 2014
La Bretagne au Mobile World Congress 2014
 
RFID Offering From SIPL
RFID Offering From SIPLRFID Offering From SIPL
RFID Offering From SIPL
 
EENA2019: Track1 session1 Citizens' needs, cloud and IP technology (...)_Guil...
EENA2019: Track1 session1 Citizens' needs, cloud and IP technology (...)_Guil...EENA2019: Track1 session1 Citizens' needs, cloud and IP technology (...)_Guil...
EENA2019: Track1 session1 Citizens' needs, cloud and IP technology (...)_Guil...
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
Differentiating Your Telecom Cloud
Differentiating Your Telecom CloudDifferentiating Your Telecom Cloud
Differentiating Your Telecom Cloud
 

More from Leonardo Amor

Sinfonier Storm Builder for Security Intelligence
Sinfonier Storm Builder for Security IntelligenceSinfonier Storm Builder for Security Intelligence
Sinfonier Storm Builder for Security IntelligenceLeonardo Amor
 
Join the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile appsJoin the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile appsLeonardo Amor
 
Be More Dog, Enise 2013
Be More Dog, Enise 2013Be More Dog, Enise 2013
Be More Dog, Enise 2013Leonardo Amor
 
Managed Security Services as a Formula1 race
Managed Security Services as a Formula1 raceManaged Security Services as a Formula1 race
Managed Security Services as a Formula1 raceLeonardo Amor
 
Ya están dentro ¿y Ahora qué?
Ya están dentro ¿y Ahora qué?Ya están dentro ¿y Ahora qué?
Ya están dentro ¿y Ahora qué?Leonardo Amor
 
Proteccion moviles Monterrey
Proteccion moviles MonterreyProteccion moviles Monterrey
Proteccion moviles MonterreyLeonardo Amor
 
Protege tu empresa en la era Wikileaks
Protege tu empresa en la era WikileaksProtege tu empresa en la era Wikileaks
Protege tu empresa en la era WikileaksLeonardo Amor
 
El papel de la seguridad en la era PostPc
El papel de la seguridad en la era PostPcEl papel de la seguridad en la era PostPc
El papel de la seguridad en la era PostPcLeonardo Amor
 
Protege los dispositivos móviles de tu empresa
Protege los dispositivos móviles de tu empresaProtege los dispositivos móviles de tu empresa
Protege los dispositivos móviles de tu empresaLeonardo Amor
 
Think Local, Be Global
Think Local, Be GlobalThink Local, Be Global
Think Local, Be GlobalLeonardo Amor
 

More from Leonardo Amor (10)

Sinfonier Storm Builder for Security Intelligence
Sinfonier Storm Builder for Security IntelligenceSinfonier Storm Builder for Security Intelligence
Sinfonier Storm Builder for Security Intelligence
 
Join the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile appsJoin the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile apps
 
Be More Dog, Enise 2013
Be More Dog, Enise 2013Be More Dog, Enise 2013
Be More Dog, Enise 2013
 
Managed Security Services as a Formula1 race
Managed Security Services as a Formula1 raceManaged Security Services as a Formula1 race
Managed Security Services as a Formula1 race
 
Ya están dentro ¿y Ahora qué?
Ya están dentro ¿y Ahora qué?Ya están dentro ¿y Ahora qué?
Ya están dentro ¿y Ahora qué?
 
Proteccion moviles Monterrey
Proteccion moviles MonterreyProteccion moviles Monterrey
Proteccion moviles Monterrey
 
Protege tu empresa en la era Wikileaks
Protege tu empresa en la era WikileaksProtege tu empresa en la era Wikileaks
Protege tu empresa en la era Wikileaks
 
El papel de la seguridad en la era PostPc
El papel de la seguridad en la era PostPcEl papel de la seguridad en la era PostPc
El papel de la seguridad en la era PostPc
 
Protege los dispositivos móviles de tu empresa
Protege los dispositivos móviles de tu empresaProtege los dispositivos móviles de tu empresa
Protege los dispositivos móviles de tu empresa
 
Think Local, Be Global
Think Local, Be GlobalThink Local, Be Global
Think Local, Be Global
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

3G Dialers, A New Demon with an Old Scan

  • 1. 3G Dialers A New Demon with an Old Scan Sao Paulo – May 12, 2010 Telefonica Empresas Spain Leonardo Amor
  • 2. 01 New solutions – Old problems Telefónica Empresas Spain 2 Security Services
  • 3. Most used 3G devices to get online Telefónica Empresas Spain 3 Security Services
  • 4. Old School RTB devices Telefónica Empresas Spain 4 Security Services
  • 5. New Solutions – Old problems  HSDPA 3G USB Tech specs:  V.90 Modem PCI Technical details:  Up to 7.2 / 21 Mbps  Up to 56 Kbps  USB 2.0  PCI  Extra bonus:  Extra bonus: • Beep, beep, beep melody • Can warns your hands in a cold day Both MODEMS Telefónica Empresas Spain 5 Security Services
  • 7. New Mobile Devices First 3G Routers (lack of WPA security) Telefónica Empresas Spain 7 Security Services
  • 8. Heterogenous OS Telefónica Empresas Spain 8 Security Services
  • 9. Internet access Source: ITU World Telecommunication/ICT Indicators Database. Telefónica Empresas Spain 9 Security Services
  • 10. Mobile users Source: ITU World Telecommunication/ICT Indicators Database. Telefónica Empresas Spain 10 Security Services
  • 11. 03 The 3G abuse story Telefónica Empresas Spain 11 Security Services
  • 12. Monitoring VS Inspection We DO NOT inspect the content Telefónica Empresas Spain 12 Security Services
  • 13. Monitoring VS Inspection We DO NOT inspect the content Just monitor the traffic flows . Telefónica Empresas Spain 13 Security Services
  • 14. Alarms 2.009 Start getting alarms for traffic to suspicius Premium numbers from 3G devices. This monitor sensor was originally setup with RTB on mind or fix phone lines. › 800 234 +++ › 645 +++ 324 › +52 244 962 +++ › 423 234 +++ Telefónica Empresas Spain 14 Security Services
  • 15. Sources Monitor Sensors Our Customers help desk Abuse Complains Third parties services • IP reputation Telefónica Empresas Spain 15 Security Services
  • 16. Abuse Group What kind of Abuses receive Telefonica? • Most of the time propetary formats, later some ARF and not IODEF at all • Please, send your complains, use an standard format. Telefónica Empresas Spain 16 Security Services
  • 17. Modem 3G problems -- User Experience Telefónica Empresas Spain 17 Security Services
  • 19. 3G User Experience Telefónica Empresas Spain 19 Security Services
  • 20. 04 The Proposal Telefónica Empresas Spain 20 Security Services
  • 21. Creation of a new Working Group To determinate major security risk related to each Mobile devices • Phishing , Malware, Fraud, Identity Thief, brand abuse, etc.. Alliances and Collaboration Telefónica Empresas Spain 21 Security Services
  • 23. If Internet would be a Today river ….. Telefónica Empresas Spain 23 Security Services
  • 24. APWG is doing a good work … • Let’s help the industry to do not fail in old problems • Come on, together we can recover the river! Telefónica Empresas Spain 24 Security Services
  • 25. Tomorrow Telefónica Empresas Spain 25 Security Services
  • 26. If Internet would be a river, Operators will distribute water Actual distribution Optimal Value Services Telefónica Empresas Spain 26 Security Services
  • 27. Security from the network The network as an active security element Clean internet access Clean VPN access Clean users SECURITY FOR SECURITY FOR SECURITY FOR LAN ACCESING PUBLIC VIRTUAL PRIVATE & ENDPOINT NETWORKS NETWORKS CLEAN CLEAN CLEAN PIPES CLOUD USERS Global security & point 2 point Telefónica Empresas Spain 27 Security Services