VoIP News
VoIP Providers
VoIP Books
VoIP Software
VoIP Jobs
VoIP Events Calendar
VoIP FAQ
Archives
Contact
About
How Exposed is VoIP Security? VON Fall 2005 Will Tell
SecurityLab Technologies Inc.
, provider of enterprise security management products and consulting services, today announced that the company's CTO, Ejovi Nuwere, will speak at the upcoming
VON Fall 2005
conference and expo. Nuwere will present the company's recent research into VoIP security flaws and explain how these flaws can be used to attack enterprise networks via VoIP technology and services.
"When it comes to VoIP security it's like 1999," says Nuwere. "Vendors blithely assume that attackers won't want to or won't be able to exploit their products. But as we all now know, if technology harbors a vulnerability it will eventually be exploited. This presentation is meant to serve as a wake up call."
Among the VoIP vulnerabilities Nuwere will discuss in his "How Vulnerable is VoIP?" presentation are those that, if exploited by an attacker, could cause VoIP gateway servers to suffer from Denial of Service attacks or give an attacker full control of the victims VoIP gateway or desktop.
"Many companies have worked hard to secure their networks, but VoIP technology, thoughtlessly deployed, can open avenues of exploitation in seemingly well-secured enterprise systems," says Nuwere.
"And these exploits aren't difficult to carry out -- someone with moderate computer skills could easily take advantage of these vulnerabilities. So it's likely that VoIP will soon become part of the malicious hackers' arsenal."
SecurityLab Technologies Inc. will also present recent discoveries from their research into common coding flaws and a preview of new products on the exhibition floor. SecurityLab Technologies will be located in Booth 1041 at the VON Fall 2005, September 19 - 22, 2005 at the Boston Convention and Exhibition Center
For more information on the conference:
www.von.com
Posted on Sep 15, 2005
Reviews
|
Share
|
Digg
Filed in:
Security
|
VoIP Events
Related Entries
•
Security Researcher Demonstrates Enterprise VoIP Phone Hack at Recent Amphion Forum
•
The SIP Forum Announces Dates and Opens Registration for Third Annual SIPNOC
•
4PSA Showcases VoipNow 3 Service Provider Beta at ITEXPO West 2012
•
Vertex Telecom Selects RedShift Networks as the VOIP/SIP Security Solution for Enterprise and Wholesale Customers
•
AstriDevCon Details Announced; Registration Opens for October 22, 2012 Conference
•
netTALK Announces Free Advanced Privacy Features Added to its DUO VoIP Devices
All comments require the approval of the site owner before being displayed.
Post a Comment
Please use a valid e-mail address. Your address will not be publicly visible and is only a means for us to contact you when asked. Thank you.
Name
E-mail
(will show your
gravatar
icon)
Home page
Remember Me
Comment (Some html is allowed:
)
Enter the code shown (prevents robots):
All brand, company, and product names are trademarks or registered trademarks of their
respective owners. © 2012 VoIP Monitor. All rights reserved.
Privacy Policy
Terms
SUBSCRIBE
Subscribe to our RSS feed
Bookmark VoIPMonitor.net
Subscribe to our newsletter via email
News Categories
Asterisk
Bluetooth Headsets
E911
General
Hardware
Investments
iPad
iPhone
Mergers and Acquisitions
Mobile VoIP
Offbeat News
Security
SIP
VoIP Advice
VoIP Awards
VoIP Bloggers
VoIP Books
VoIP by Region
Africa
Asia
Australia
Europe
Middle East
North America
South America
VoIP Events
VoIP Jobs
VoIP Products
VoIP Promotions
VoIP Providers
ATT
Fusion
Google Talk
Lingo
MCI
MSN Messenger
Net2Phone
Packet8
Phone Power
Pingo
Qwest
RingCentral
SBC
Skype
SunRocket
Verizon
ViaTalk
Vonage
Yahoo Messenger
VoIP Reports
VoIP Software
VoIP Solutions
VoIP Wireless
WiFi
VoIP Information
Tom Keating
Alec Saunders
Andy Abramson
Garrett Smith
Jeff Pulver
Om Malik
Thoughts on VoIP
Solomon's VoIP World
VoIP Weblog
VoIP Guide
Archives
May, 2013 (2)
December, 2012 (3)
November, 2012 (7)
October, 2012 (19)
September, 2012 (5)
August, 2012 (10)
July, 2012 (24)
June, 2012 (18)
May, 2012 (28)
April, 2012 (20)
March, 2012 (16)
February, 2012 (12)
January, 2012 (12)
November, 2011 (21)
October, 2011 (28)
September, 2011 (23)
August, 2011 (26)
July, 2011 (26)
June, 2011 (38)
May, 2011 (59)
April, 2011 (49)
March, 2011 (67)
February, 2011 (68)
January, 2011 (54)
December, 2010 (45)
November, 2010 (43)
October, 2010 (47)
September, 2010 (43)
August, 2010 (32)
July, 2010 (28)
June, 2010 (39)
May, 2010 (46)
April, 2010 (36)
March, 2010 (52)
February, 2010 (45)
January, 2010 (44)
December, 2009 (41)
November, 2009 (46)
October, 2009 (54)
September, 2009 (58)
August, 2009 (29)
July, 2009 (36)
June, 2009 (32)
May, 2009 (32)
April, 2009 (13)
March, 2009 (47)
February, 2009 (37)
January, 2009 (53)
December, 2008 (44)
November, 2008 (56)
October, 2008 (51)
September, 2008 (50)
August, 2008 (41)
July, 2008 (50)
June, 2008 (52)
May, 2008 (53)
April, 2008 (64)
March, 2008 (59)
February, 2008 (53)
January, 2008 (65)
December, 2007 (39)
November, 2007 (33)
October, 2007 (65)
September, 2007 (29)
August, 2007 (52)
July, 2007 (49)
June, 2007 (59)
May, 2007 (64)
April, 2007 (43)
March, 2007 (66)
February, 2007 (100)
January, 2007 (108)
December, 2006 (86)
November, 2006 (100)
October, 2006 (86)
September, 2006 (55)
August, 2006 (31)
July, 2006 (76)
June, 2006 (79)
May, 2006 (87)
April, 2006 (45)
March, 2006 (55)
February, 2006 (55)
January, 2006 (56)
December, 2005 (53)
November, 2005 (61)
October, 2005 (13)
September, 2005 (42)
August, 2005 (57)
April, 2005 (57)
March, 2005 (21)
February, 2005 (15)