Read more about VoIP
Bookmark and Share
  • In-house control and encrypted voice calls

    14.06.2013

    Cellcrypt announced Cellcrypt Private Switch, a private network that allows an organizationís administrators complete privacy over user identity and calling activity.

  • Poor Skype account verification allows account hijacking

    29.04.2013

    A security researcher and hacker that does by the online handle of TibitXimer claims that his Skype account has been hijacked six times in one day due to Skype's poor account recovery practices.

  • DDoS attacks aimed at telecom systems are on the rise

    01.08.2012

    DDoS attacks are usually seen as the domain of hacktivists and hackers looking to block - then blackmail - companies that are heavily dependent on their Internet presence.

  • VolP: The new way in?

    20.03.2012

    Voice is now data and as such it is a new attack vector for hackers into a company network.

  • Hiding messages in VoIP packets

    15.11.2011

    A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a relatively simple way of hiding information within VoIP packets exchanged during a phone conversation.




Spotlight

What can we learn from the top 10 biggest data breaches?

Posted on 21 August 2014.  |  Here's a list of the top 10 biggest data breaches of the last five years. It identifies the cause of each breach as well as the resulting financial and reputation damage suffered by each company.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //