O'Reilly logo

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition by David Endler, Mark Collier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 7HARASSING CALLS AND TELEPHONY DENIAL OF SERVICE (TDOS)

We are under attack. We are a target. This is serious s***. I am one attack away from being on the cover of Newsweek!

—Top-five U.S. bank executive on the topic of TDoS

A phone or a UC network can be used for nefarious purposes in various ways, especially when directed against an individual or an organization. These ways include harassing, threatening, and disruptive inbound types of calls, which can be manually generated or automated “robocalls.” Here are descriptions of some of the most common call types:

Harassing calls Prank calls or just annoying calls intended to irritate the victim. This could be from any person, such as an ex-spouse or competitor. These calls are normally ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required