Premium Content

Access "Identifying VoIP phone security risks, attacks"

Marcus Ranum, Contributor Published: 12 Oct 2012

Getting enough Viagra spam in your email inbox? Or telemarketing calls with special credit card offers when you're sitting down to dinner? Just wait until you have a VoIP phone on your desk. Secure VoIP Tutorial This page is a part of's learning guide, Secure VoIP tutorial: Understanding VoIP security best practices. With comparatively lower costs than conventional telephony, voice over IP is poised to be the next killer app, with projected market sales of $10 billion. And where the packets go, spam will follow. Imagine coming to work Monday morning to find a voicemail box filled with dozens of spam messages. You'll have to sift through low-rate mortgage pitches, Nigerian money-laundering offers and ads for manhood enlargement pills just to get to your assistant's message that he's calling in sick. In today's market, typical security managers are saying, "No problem! We've got spam licked." Boy, are they wrong. Content analysis of voice data is extremely difficult, since anything that introduces latency will disrupt the technology, which ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free