Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

hacker tag

Drill down on hacker search:

6 result(s) displayed for hacker (26 - 31 of 31):

Botnets, Terrorism and Crime

This MSNBC article on botnets is a well-written piece detailing where botnet gangs come from, their “hacker scholarship” programs and the potential for these powerful bot networks to shut down sites on a moments notice if they so choose. In...

Protecting IMS/UMA and IP Communications

The advent of any technology is when unscrupulous users see if they can take advantage of it. The first computer worms, viruses and spam are a few examples of how good technology was used by those with malicious intent to...

The Real Hacker Damage

Like any good computer Samaritan I do all I can to avoid having my computer taken over and used in denial of service attack or to send volumes of spam messages on behalf of those malicious people who benefit from...

US Cybersecurity

Here is an overview of the state of US cybersecurity. I am pretty surprised and how many alleged state-sponsored attacks there are. Articles like this make you realize that security on the Internet will only grow in importance over time....

Hackers Targeting Programs

Just when you thought it was safe to compute, hackers are beginning to exploit vulnerabilities in PC-based programs instead of server based software and operating systems. Full story....

ICE

TMC’s Bob Liu and Tom Keating wrote an excellent article on Microsoft and Cisco collaborating on the ICE standard, a technology used to enable VoIP traffic to more easily permeate firewalls in a secure fashion. Currently, session border controllers (SBCs)...
Featured Events