Unified Communications: Click to talk:

VoIP security


April 3, 2009  12:57 PM

Test and Verify OCS Security with OAT



Posted by: Tony Bradley
OAT, OCS Assessment Tool, Office Communications Server, Sipera Systems, unified communications security, VIPER Lab, VoIP security

At Voicecon 2009 in Orlando this week Sipera Systems announced a new free tool for assessing unified communications and VoIP security. The OCS Assessment Tool, dubbed OAT, is available as a

March 30, 2009  12:55 AM

BCI Chooses Sipera for UC Security



Posted by: Tony Bradley
BCI, real-time, SIP trunking, Sipera, unified communications security, VIPER Lab, VoiceCon, VoIP security

Chile-based Banco de Credito e Inversiones (BCI) has chosen Sipera to secure their unified communications infrastructure. Using Sipera's IPCS unified...


January 25, 2009  2:15 PM

Attackers Place $120,000 in Unauthorized Phone Calls



Posted by: Tony Bradley
Evangelyze Communications, toll fraud, VoIP, VoIP security

Your phone bill varies from month to month in many cases. Actually- maybe not. I have been using Vonage for my home phone service for about 5 years now and the flat fee is what it is. I don't pay for voicemail service, or any additional amounts for...


January 1, 2009  2:41 PM

Do-It-Yourself DECT Hacking



Posted by: Tony Bradley
attack, DECT, eavesdropping, VoIP, VoIP security

I have DECT cordless phones in my home. I didn't really get them for the security factor per se. I bought them because their operation isn't impacted or interfered with by wireless networks, microwave ovens, or baby monitors. I was tired of having 27 different devices all competing for the same...


December 29, 2008  3:03 PM

Protecting VoIP Against Three Common Threats



Posted by: Tony Bradley
Denial-of-Service, DoS, Spam over Internet Telephony, SPIT, toll fraud, voice, VoIP, VoIP security

There are a number of way, theoretically, that a VoIP communications system could pose a security risk to an enterprise. Let's face it, while the network administrators have been in the trenches fighting unauthorized access, malware infections, data compromise, and more on a daily basis for the...


December 27, 2008  3:19 PM

Security Funding First To Go In Tough Economic Times



Posted by: Tony Bradley
budget, funding, investment, Security, UC security, Unified Communications, VoIP, VoIP security

Let's be honest - even in a good economy, when business is booming, security is still a reluctant after-thought in most cases. Why do we have Sarbanes-Oxley, HIPAA, GLBA, PCI DSS and other legislation and regulatory requirements? Because companies can't be trusted to do the right thing of their own...


December 22, 2008  2:50 PM

Exploiting VoIP for Toll Fraud



Posted by: Tony Bradley
Hacking Exposed, SecureLogix, toll fraud, VoIP, VoIP security

Toll fraud is nothing new. Pretty much since there have been telephones, or at least enterprise telephone systems, attackers have sought to somehow hijack or piggyback on them in order to place toll phone calls at the expense of the company that owns the phone system. As with many other types of...


December 9, 2008  1:46 PM

FBI Warns of Asterisk-based Vishing Attacks



Posted by: Tony Bradley
Asterisk, Digium, FBI, Phishing, vishing, VoIP security

The FBI has issued a warning that a vulnerability in the open-source Asterisk platform, used by many as a free IP PBX, can lead to the system being...


December 4, 2008  4:15 AM

VoIP Security: The Great Afterthought



Posted by: Tony Bradley
SearchUnifiedCommunications, Security, TechTarget, UC, Unified Communications, VoIP security

Why is security always an afterthought? It seems that time and again there are technological innovations that businesses embrace. They do their due diligence to compare their options. They invest heavily to purchase and implement the new technology. They spend money to educate users to take...


November 30, 2008  5:05 AM

Security Concerns of UC Networks



Posted by: Tony Bradley
Nortel, SIP, Sipera Systems, UC, Unified Communications, VLAN, VoIP security

When voice was just voice, it did not pose a security risk to the data network...at least not directly. It could be argued that there is still potential to exploit the voice network for social engineering purposes that result in a compromised data network, but that is a semi-convoluted argument and...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: