O'Reilly logo

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition by David Endler, Mark Collier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 6CALLING NUMBER SPOOFING

That’s weird—my bank is calling me. I wonder what they want. I better answer; someone might be abusing my credit card.

—Victim of calling number spoofing

One of the key values provided for all calls is the calling number. This number represents the user, consumer, or business originating the call. Another common term for the source number is “Caller ID.” Although this term actually has a specific meaning, which we will cover shortly, it is often used to refer to the source or calling number. Although we currently take being able to see the calling number for granted, it wasn’t that long ago that you had no idea who was calling you when your home phone rang. Even today, you can still find and buy inexpensive analog ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required