Read more about VoIP
Bookmark and Share
  • In-house control and encrypted voice calls

    14.06.2013

    Cellcrypt announced Cellcrypt Private Switch, a private network that allows an organizationís administrators complete privacy over user identity and calling activity.

  • Poor Skype account verification allows account hijacking

    29.04.2013

    A security researcher and hacker that does by the online handle of TibitXimer claims that his Skype account has been hijacked six times in one day due to Skype's poor account recovery practices.

  • DDoS attacks aimed at telecom systems are on the rise

    01.08.2012

    DDoS attacks are usually seen as the domain of hacktivists and hackers looking to block - then blackmail - companies that are heavily dependent on their Internet presence.

  • VolP: The new way in?

    20.03.2012

    Voice is now data and as such it is a new attack vector for hackers into a company network.

  • Hiding messages in VoIP packets

    15.11.2011

    A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a relatively simple way of hiding information within VoIP packets exchanged during a phone conversation.




Spotlight

Lessons learned developing Lynis, an open source security auditing tool

Posted on 15 October 2014.  |  Lynis unearths vulnerabilities, configuration errors, and provides tips for system hardening. It is written in shell script, installation is not required and can be performed with a privileged or non-privileged account.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Oct 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //