Homepage This page's url is: -crn- Rankings and Research Companies CRNtv Events WOTC Jobs Tech Provider Zone Ingram Micro Newsroom

Top 9 VoIP Threats And Vulnerabilities

Whether it's malicious, for financial gain or for bragging rights, 2008 will see an evolving roster of threats to VoIP systems.

Back 1 ... 5   6   7   8   9   ... 10 Next

New connectivity options in the coming year are sure to expose VoIP to those who will leverage it for ill-gotten gain. Using VoIP over Wi-Fi will have hackers and attackers salivating. With the relative insecurity of VoIP and Wi-Fi separately, combining the two creates a perfect storm of threats. "We know that VoIP is insecure," Joglekar said, "and we're going to put it over Wi-Fi, which is also insecure." Using VoIP over Wi-Fi eliminates the need for a hacker to have physical access to the network, instead, using a sniffer or similar tool, a potential attacker can get onto the Wi-Fi network from outside or a different location and use that as an entry point to VoIP.

Back 1 ... 5   6   7   8   9   ... 10 Next

sponsored resources