Q
Problem solve Get help with specific problems with your technologies, process and projects.

How to prevent VoIP phishing

Don't fall prey to a VoIP phishing scam. In this Information Security Threats Ask the Expert Q&A, Ed Skoudis explains why end-to-end encrypted VoIP phones cannot prevent VoIP scams and how to protect against them.

Do end-to-end encrypted VoIP phones prevent VoIP phishing?
No. While encryption is useful for protecting VoIP traffic from snooping, it does not stop VoIP phishing. VoIP phishing is when an attacker uses an automated tool to call VoIP numbers (and POTS numbers) to leave a message pretending to be your bank or other e-commerce entity. Therefore, even with a rock-solid encrypted VoIP connection, attackers can still make such calls.

To guard against VoIP phishing, be leery of giving sensitive personal information especially over your VoIP phone....

And remember, VoIP caller IDs are easy to spoof, so don't trust the friendly voice on the other end of the phone line, until they prove their identity.

More Information:
 

  • Learn why hackers started using VoIP in phone phishing scams.
  • Learn how to mitigate other VoIP threats in this VoIP Security Learning Guide.
This was last published in August 2006

Dig Deeper on IPv6 security and network protocols security

PRO+

Content

Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close