« Article on the 8 Most Common VoIP/UC Security Issues |
| My List of the 8 Most Common/Severe VoIP and UC Security Threats »
Here is a brief video showing how to exploit a UC phone to gather enough information, to allow different types of attacks on an IP PBX.
Posted at 10:09 AM in UC security, Voice Security, VoIP Security | Permalink
This is only a preview. Your comment has not yet been posted.
The letters and numbers you entered did not match the image. Please try again.
As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.
Having trouble reading this image? View an alternate.
(URLs automatically linked.)
(Name and email address are required. Email address will not be displayed with the comment.)
Name is required to post a comment
Please enter a valid email address