Read more about VoIP
Bookmark and Share
  • Skype can be used to tie users to illegal download activity

    21.10.2011

    A team of researchers has proved that it is possible to determine the IP address of a user and tie it with his Internet use, and even correlate this information to his file-sharing activity with high accuracy, by taking advantage of a privacy hole in Skype.

  • Government telecommunication-spying malware opens backdoor

    10.10.2011

    The Chaos Computer Club claims that a government-made "lawful interception" Trojan has abilities that exceed those allowed by the nation's legislature and that those features can be easily misused by third parties through a series of design and implementation flaws.

  • Cyber crooks misusing audit tool to breach VoIP servers

    01.09.2011

    Every now and then, cyber criminals misuse "good" software in order to do bad things, and the latest instance of this modus operandi has been spotted by NSS Labs researchers.

  • SANS to teach VoIP security in Europe

    18.04.2011

    The SANS Institute will be teaching the first European session of its new Security 540: VoIP Security course at the upcoming SANS Secure Europe event in Amsterdam this May.

  • Hacking Unified Communications security

    08.04.2011

    UC is most often defined as the convergence of multiple communications applications typically VoIP, collaboration tools, instant messaging, presence-enabled tools, and IP video conferencing.




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //