Top 9 VoIP Threats And Vulnerabilities

Just like vishing works in a similar fashion as e-mail, VoIP spam will again show itself next year. Though VoIP spam is really less a threat and more an annoyance, it's a vulnerability that is sure to be exploited, Joglekar said. Since VoIP IDs can consist of numbers or characters, they become similar to e-mail addresses, meaning someone can reach you by telephone through the Internet. Spam writers can use VoIP to flood voicemail boxes with junk messages or keep the phone ringing, not allowing more important, welcomed calls to come through.

Get a roundup of CRN's networking coverage right to your inbox with the CRN Networking newsletter.