How to prevent voicemail hacking

clock

There are important measures that mobile operators and users can take

Voicemail hacking is not new. The two main methods are guessing PINs or using spoofing to bypass caller ID-based access control. For convenient remote access to voicemail, e.g. where caller ID is not...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Mobile Software

How to accelerate your software development career - top tips 

How to accelerate your software development career - top tips  

Lorna Mitchell
clock 25 May 2022 • 5 min read
Interview: Sunlight, AI & Machine Learning Awards finalist

Interview: Sunlight, AI & Machine Learning Awards finalist

"Sunlight was born out of a collaboration with ARM in 2013 and that was to build a lightweight hypervisor that could really efficiently virtualise low power and embedded processor platforms"

Computing Staff
clock 13 May 2022 • 2 min read
Industry Voice: The Secret to Setting Up a Successful Digital Workspace

Industry Voice: The Secret to Setting Up a Successful Digital Workspace

VMware
clock 16 March 2022 • 3 min read