Search This Blog

Tuesday, December 18, 2007

VoIP vulnerabilities increasing, but not exploits; Successful phishing attacks up

Security Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
VoIP vulnerabilities increasing, but not exploits

Tim Greene By Tim Greene
PBXs are servers on corporate networks and are susceptible to the many exploits that networks in general are heir to, such as denial-of-service and buffer overflows. There have been few exploits so far, however, and none that were widespread or crippling to businesses. Read full story

Tim Greene is a senior editor at Network World, covering network access control, virtual private networking gear, remote access, WAN acceleration and aspects of VoIP technology. You can reach him at tgreene@nww.com.

MORE STORIESARROW


SPONSORED BY NETPRO COMPUTING INC
rule

Log Management Leads to Better Security
Discover how improving log management leads to a more secure network and regulatory compliance in this informative whitepaper. Get a run down of many of the regulations and how simplifying log management can help you more easily comply with them. Find out more today. Download this whitepaper now.

rule
RELATED NEWS:

Successful phishing attacks up, online survey shows
Phishing attacks on U.S. consumers were more successful this year than last, says Gartner. The good news? Phishing victims appear to be getting more help from banks and PayPal to recover their losses.

Software tracks messages sent to and from BlackBerrys
Gwava, the developer of security software, plans to introduce on Monday a new product that lets enterprises easily track and find text messages and phone calls that BlackBerry users send and receive.

Building a VPN with Cisco ASA gear
The organization I work for recently bought a Cisco ASA 5510 and 3 ASA 5505s to replace some SonicWalls we have in a few group homes. They are going to be doing a site-to-site VPN tunnel so that the group homes can access our VoIP phones and also ...

Privacy, data breaches still run rampant, shows survey of IT pros
Privacy incidents involving mishandled personally identifiable information are rampant in organizations, according to a survey of 827 security and privacy professionals in North America.

Commtouch takes aim at zombie machines
Commtouch is hoping that its new e-mail filtering service will take a chain saw to messages sent from zombie hosts.

PODCAST

Feds dropping ball on IPv6; Open-source antivirus goes commercial
How feds are dropping the ball on IPv6; Open source antivirus program gets commercial twist.


THE FASTEST FIREWALLS
Clear Choice Test  Crossbeam, IBM win raw performance test; Juniper scores on price.

HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

SPONSORED BY NETPRO COMPUTING INC
rule

Log Management Leads to Better Security
Discover how improving log management leads to a more secure network and regulatory compliance in this informative whitepaper. Get a run down of many of the regulations and how simplifying log management can help you more easily comply with them. Find out more today. Download this whitepaper now.

rule

Holiday Tech Toys
Stumped on what gadgets and gizmos to give this holiday? Have no fear, Cool Tools' Keith Shaw is here. We do all of the heavy lifting of wading through hundreds of submitted technology products to find the very best holiday gift ideas. Click here to view our holiday gift guide: http://www.nww.com/PSA2_1210

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsstuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

12/18/07

TODAY'S MOST-READ STORIES:

  1. Xbox signal jamming WLANs
  2. Feds are dropping the ball on IPv6
  3. Cisco opening up IOS
  4. Unix admin tried to axe power grid
  5. Sun, ex-staffers in war of words
  6. Guru predicts last-minute IPv6 switch
  7. Trojan robbing online bank customers
  8. Google develops Wikipedia rival
  9. Boosting cell signals indoors
  10. The nine worst Microsoft products


TOP 100 OF 2007


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments: