VolP: The new way in?
by Mirko Zorz - Tuesday, 20 March 2012.
Voice is now data and as such it is a new attack vector for hackers into a company network. Most VoIP systems being deployed are based on Session Initiation Protocol (or SIP) which was designed in the 90s when security was less of an issue.

In this podcast, Simon Heron, an Internet Security Analyst for Redscan, discusses the demand for, and the risks of VoIP deployment. He also suggests measures that should be implemented to defend voice traffic.

Press the play button below to listen to the podcast:

Simon Heron is an Internet Security Analyst for Redscan, a unified threat management company. He has more than 19 years experience in the IT industry, including eight years experience in internet security. During this time he has developed and designed technologies including firewalls, anti-virus, LANs and WANs.

Simon began his career as a digital hardware and software engineer, developing pioneering speech recognition technology before moving on to work for the British Antarctic Survey (B.A.S.) as science project leader. While at the B.A.S. he spent two Antarctic winters at the research station Halley in the Antarctic, developing and enhancing graphical technologies in the harshest of conditions.


Pen-testing drone searches for unsecured devices

You're sitting in an office, and you send a print job to the main office printer. You see or hear a drone flying outside your window. Next thing you know, the printer buzzes to life and, after spitting out your print job, it continues to work and presents you with more filled pages than you expected.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Oct 9th