SecurityProNews Directory: A Directory For All Things Security

NEC To Seal Out VoIP Spit

NEC Corporation claims to have a new technology called VoIP SEAL that can prevent Spam over Internet Technology (SPIT) through the use of a Turing test to detect spam-generated calls.

NEC To Seal Out VoIP Spit
NEC To Seal Out VoIP Spit

The Turing test is a measurement of how well a computer can imitate a human in a conversation. NEC said it uses such a test to weed out SPIT from legitimate calls made to someone over VoIP.

This has become a necessity due to criminal attempts to fool people into parting with personally identifiable information using voice technology. With the right hardware and software, those criminals can mimic the voice system of a legitimate business.

Since such automated voice systems are so common, people who are used to dealing with them may give up that information and never realize what has happened until their accounts have suffered losses.

It’s a good habit to stick to calling banks and financial institutions from the phone numbers provided on debit and credit cards. Many people may be suckered into responding to a VoIP spam attempt, which is what moved NEC to develop SEAL.

Ahead of next month’s 3GSM World Conference 2007 in Barcelona, NEC said it has carried out a SPIT attack against a VoIP SEAL-protected system. Their testing showed the solution proved 99 percent effective at keeping spam call from ringing someone’s VoIP phone.

NEC sees SPIT as being a major hindrance to adoption of VoIP technology. SPIT can be generated in a similar manner to conventional spam, and pushed out through botnet of compromised machines to millions of VoIP numbers.

If Vint Cerf’s assessment of the botnet problem is correct, based on comments he made at the World Economic Forum, as many as 150 million computers are already infected and ready to be used for spam or other purposes. Including SPIT.


Tag:

Add to Del.icio.us | Digg | Reddit | Furl

Get all the updates –

David Utter
About David Utter
David Utter is a business and technology writer for SecurityProNews and WebProNews.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>