Tom Keating : VoIP & Gadgets Blog
Tom Keating
CTO
| VoIP & Gadgets blog - Latest news in VoIP & gadgets, wireless, mobile phones, reviews, & opinions

hacker tag

Drill down on hacker search:

6 result(s) displayed for hacker (1 - 6 of 6):

Hacked Asterisk PBX Update

I wanted to give an update to my Asterisk Hack Post-mortem article. By the way, I love this image of a hacker sporting a fedora in case you're wondering why I used it in both articles! I found this interesting...

Asterisk Hack Post-mortem

Having your production Asterisk-based phone system hacked is no fun, as I have learned from first-hand experience over the past few days. Even the best of IT administrators taking ever security precaution in the book dreads the day their critical...

AstriCon VoIP Security - $400,000 toll fraud - YIKES!

During an AstriCon session on VoIP security the speaker discussed how easy it was to hack voicemail PINs, but not to listen to your voice messages but to initiate "call backs" using spoofed CallerIDs. Essentially, this leverages the "call back"...

VoIP Hacker vs. VoIP Server Honeypots

It's VoIP hacker vs. VoIP Server. Who will lay the smack down and win this battle of good vs. evil? The stakes are high. If the hacker wins, it can mean thousands of dollars of phone charges, fraud, and potential...

Cracking IP-PBX SIP Passwords - Be Afraid!

A few years ago I had an email conversation with Chris Lyman, the former CEO of Fonality, the makers of trixbox IP-PBX systems. I expressed concern that their trixbox Pro system was using the MAC address both for the...

Are Hackers Stealing your Data via Wireless WiFi Signals?

Until I read this "Stealth wallpaper keeps company secrets safe | New Scientist" article, the only way I knew of to block external access to WiFi signals was to line the building's walls with aluminium foil, and use special glass...
Featured Events