Please turn on your JavaScript for this page to function normally.
3CX
3CX customers targeted via trojanized desktop app

Suspected state-sponsored threat actors have trojanized the official Windows desktop app of the widely used 3CX softphone solution, a number of cybersecurity companies began …

Adapting the network for a remote working future

In the wake of the 2008 financial crisis, there was a big emphasis on stress testing major banks to determine if they have the reserves and processes to withstand such an …

Why VoIP security is crucial for organizations

With more organizations turning to VoIP (Voice over Internet Protocol) and cloud-based Unified Communications (UC) systems to underpin their commercial services and corporate …

phone
VoIP phones can be turned into spying or money-making tools

A security vulnerability present in many enterprise-grade VoIP phones can easily be exploited by hackers to spy on employees and management, says security consultant Paul …

Critical 0-days found in CPE WAN Management Protocol

Check Point has released its findings of security concerns in CPE WAN Management Protocol (CWMP/TR-069) deployments, used by major ISPs globally to control business and …

US bank customers targeted with vishing messages

Customers of a number of US banks have recently been hit by Voice over IP phishing (vishing) attacks orchestrated by eastern European cyber crooks, warns John LaCour, founder …

Unified Communications Forensics

“Unified Communications is the integration of real-time communication services such as instant messaging, presence information, telephony (including IP telephony), video …

In-house control and encrypted voice calls

Cellcrypt announced Cellcrypt Private Switch, a private network that allows an organization’s administrators complete privacy over user identity and calling activity. …

Poor Skype account verification allows account hijacking

A security researcher and hacker that does by the online handle of TibitXimer claims that his Skype account has been hijacked six times in one day due to Skype’s poor …

DDoS attacks aimed at telecom systems are on the rise

DDoS attacks are usually seen as the domain of hacktivists and hackers looking to block – then blackmail – companies that are heavily dependent on their Internet …

VolP: The new way in?

Voice is now data and as such it is a new attack vector for hackers into a company network. Most VoIP systems being deployed are based on Session Initiation Protocol (or SIP) …

Hiding messages in VoIP packets

A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a relatively simple way of hiding information within VoIP …

Don't miss

Cybersecurity news