To guard against VoIP phishing, be leery of giving sensitive personal information especially over your VoIP phone. And remember, VoIP caller IDs are easy to spoof, so don't trust the friendly voice on the other end of the phone line, until they prove their identity.
Dig Deeper on IPv6 security and network protocols security
Related Q&A from Ed Skoudis
Learn how social networking sites compound the insider threat risk, and explore how to mitigate the threat with policy, training and technology. Continue Reading
At Black Hat 2006, researcher Joanna Rutkowska unveiled a piece of machine-based malware called the Blue Pill. But is it a serious threat to your ... Continue Reading
Wi-Fi on airplanes seems like it will be unavoidable in the future, but what security risks does it pose? In this security threats expert response, ... Continue Reading