From a security viewpoint, VoIP is a nightmare, combining the worst vulnerabilities of IP networks and voice networks. But VoIP’s security challenges can be solved. All it takes is a plan. Step 1: ...
You deserve to know who's calling. Learn how to find the owner of a VoIP number on your own, and involve law enforcement if that’s what it takes. When you choose a top provider, maintaining VoIP ...
When you choose a top provider, maintaining VoIP security and encryption is no harder than using a strong password. Here’s how to get set up. Any modern business using a Voice over Internet Protocol ...
VPNs could be a way around some problems that arise with VoIP. During a session at last week’s Spring 2006 VON conference, one speaker advocated using VPNs to encrypt VoIP packets as they pass from ...
You’ve probably already heard about the latest VoIP scam: vishing. It works as follows: An unwary user gets an e-mail (or an automated phone call) advising him that his credit card is displaying ...
SINGAPORE—Security concerns about voice over IP (VoIP) have made headlines in recent weeks, but industry experts have played down the fears. They note that how a company protects its IP telephony ...
There are too many sources of vulnerability for VoIP to ever be completely secure, says Patrick Park, author of VoIP Security. Here he describes the VoIP threat landscape and offers best practices for ...
LAS VEGAS--Phil Zimmermann gave free e-mail encryption to the world more than a decade ago in the form of software called Pretty Good Privacy. Now Zimmermann, who ...
Editor's note: This is the last of a three-part series on networking. The first part, which appeared in the June 13 issue of Federal Computer Week, focused on efforts to consolidate networks. The ...
The AGN Sipera partnership represents a powerful new dynamic in VoIP services and will enable AGN to integrate the Sipera IPCS product into its OnDemand SIP(TM) offering. The innovative secure SIP ...
As the use of VoIP continues to grow, so does the number of treats and vulnerabilities hackers can use to attack a system. Whether it's malicious, for financial gain or for bragging rights, 2008 will ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results