Top 9 VoIP Threats And Vulnerabilities

While not technically a threat or specific vulnerability, Joglekar said the lack of robust implementation in VoIP devices will also lead to attacks in 2008. Lack of robust tools in phones and servers mean users can't monitor their implementation and the protocols used to implement service. A weak implementation opens up the door for a hacker to send a message and make the system crash or execute code to get access to a laptop and pull data from it. Joglekar said by and large VIPER Lab research has found that implementation errors and systems lacking robustness are sure to be hit this year.

Next Page