« Article on the 8 Most Common VoIP/UC Security Issues |
| My List of the 8 Most Common/Severe VoIP and UC Security Threats »
Here is a brief video showing how to exploit a UC phone to gather enough information, to allow different types of attacks on an IP PBX.
Posted at 10:09 AM in UC security, Voice Security, VoIP Security | Permalink
The comments to this entry are closed.