Thank you for letting me hacking your PBX/UC network!

Brute force attack against voice systems is a real, and growing, problem. In a denial-of-service (DoS) attack, the goal is to make a resource unavailable to its intended users, usually in a temporary interruption or suspension of services. DoS attacks are well known in data systems and networks, but can also happen to a telecom Read more about Thank you for letting me hacking your PBX/UC network![…]

How to prevent vulnerabilities threaten VoIP deployments

Data breaches can bring businesses to their knees – disrupting services and tarnishing the reputations of brands. VoIP services aren’t immune to data theft. Just last year, a breach at Secures Technologies compromised 70 million records across 37 states. The company provides phone services to prisons, and the breach raised privacy concerns because it affected Read more about How to prevent vulnerabilities threaten VoIP deployments[…]

How Session Border Controllers help secure contact centers – and create efficiencies.

As contact centers continue to adopt IP-based communications of various sorts, including voice and other unified communications applications, it opens up organizations to a host of security threats that need to be addressed. To a would-be intruder, an IP-based contact center represents opportunity – a whole slew of IP-based ports through which they may gain Read more about How Session Border Controllers help secure contact centers – and create efficiencies.[…]