
Chinese Malware, a Year in Review of Zero-day Exploits, a Ransomware Study, and Listener Questions
Hacker And The Fed
 00:00 
Fraudulent Use of Paid Phone Numbers
This chapter explores the tactics of using paid phone numbers for fraudulent text messages, discussing the financial implications for targeted companies and the need for protection against this type of attack.
 Play episode from 37:22 
 Transcript 


