Mobile eavesdropper nets phone phishers

Powered by SC Magazine
 

Japan cops use technology to accurately ID suspect calls.

Japan's national police agency and a regional bank in the country have deployed a voice recognition technology in mobile phones said to be capable of catching out phishing scams almost every time.

Development of the claimed world first technology by Fujitsu and Nagoya University began in 2009 and has recently completed.

Researchers say it was capable of analysing phone conversations to “detect situations in which one party might 'over trust' the other party”.

It blends voice detection tuned to changes in voice pitch – indicative of so-called 'overtrust' – with a list of keywords typically used in phishing scams such as 'indebtedness' and 'compensation'.

When a phone scam was detected, the technology would notify a third party to help assist the victim.

Developers said it was 90 per cent successful in early trials of the technology.

Preventing people from falling victim to phishing scams was complex, researchers said, not least because overtrust keywords could be obfusciated when people were under psychological stress.

In these conditions, phonetic words became more difficult to understand. This was offset by examining voice pitch.

“In situations of overtrust, there is the risk of believing everything another person is saying, even in cases of remittance-soliciting phone phishing scams, for example. In order to prevent such scams, there is a need to detect such situations and provide appropriate support.”

The technology resulted from the research project "Creation of Human-Harmonised Information Technology for Convivial Society run within Japan's Science and Technology Agency.

Copyright © SC Magazine, Australia


Mobile eavesdropper nets phone phishers
 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1066

Vote