Machine learning

Researchers Find A Possible Solution To The Problem Of Robocalling Using Machine Learning

The United States government has begun to take significant steps to eliminate robocalls. The FCC requires that phone companies use a cryptography-based technology called STIR/SHAKEN to authenticate all callers’ IDs beginning June 30, 2021.

Anyone hoping for robocalls to evaporate in a puff of regulation will be sorely disappointed. However, respite may be on the way, albeit slowly. The technology to block robocalls is developing, and STIR/SHAKEN is part of a trend in which phone consumers in the United States are no longer solely responsible for deciding whether or not to accept robocalls. Now it’s up to the phone companies to do their part.

Spam-call-blocking apps collect hard statistics on robocalls using the phones of their users as a sample. Brazil is the world’s spam call nexus, according to one such index published by the app Truecaller. In 2021, the average Truecaller user received 33 spam calls per month, roughly double the rate of Peru, which came in second.

Since 2015, another program, YouMail, has started tracking robocalls in the United States. Its indicator reveals that the number of robocalls in the United States increased significantly throughout the late 2010s until plummeting by nearly half in early 2020, owing to COVID-19. It was short-lived. Robocalls had already returned to 2018 levels by the end of the year.

Read more

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Directive NIS 2 : Comprendre les obligations en cybersécurité pour les entreprises européennes

Directive NIS 2 : Comprendre les nouvelles obligations en cybersécurité pour les entreprises européennes La…

2 jours ago

NIS 2 : entre retard politique et pression cybersécuritaire, les entreprises dans le flou

Alors que la directive européenne NIS 2 s’apprête à transformer en profondeur la gouvernance de…

3 jours ago

Quand l’IA devient l’alliée des hackers : le phishing entre dans une nouvelle ère

L'intelligence artificielle (IA) révolutionne le paysage de la cybersécurité, mais pas toujours dans le bon…

4 jours ago

APT36 frappe l’Inde : des cyberattaques furtives infiltrent chemins de fer et énergie

Des chercheurs en cybersécurité ont détecté une intensification des activités du groupe APT36, affilié au…

4 jours ago

Vulnérabilités des objets connectés : comment protéger efficacement son réseau en 2025

📡 Objets connectés : des alliés numériques aux risques bien réels Les objets connectés (IoT)…

7 jours ago

Cybersécurité : comment détecter, réagir et se protéger efficacement en 2025

Identifier les signes d'une cyberattaque La vigilance est essentielle pour repérer rapidement une intrusion. Certains…

7 jours ago

This website uses cookies.