We are under attack. We are a target. This is serious s***. I am one attack away from being on the cover of Newsweek!
—Top-five U.S. bank executive on the topic of TDoS
A phone or a UC network can be used for nefarious purposes in various ways, especially when directed against an individual or an organization. These ways include harassing, threatening, and disruptive inbound types of calls, which can be manually generated or automated “robocalls.” Here are descriptions of some of the most common call types:
• Harassing calls Prank calls or just annoying calls intended to irritate the victim. This could be from any person, such as an ex-spouse or competitor. These calls are normally ...