June 17, 2010

EB Releases Hardened IP VoIP Phone for Military & Defence Use

EB, Elektrobit Corporation, a developer of cutting-edge embedded technology solutions for automotive and wireless industries, today announced two new VoIP phones to its EB Tough VoIP(TM) product portfolio with EB Tough VoIP Field Phone and EB Tough VoIP Desktop Phone. Introduced today at EuroSatory 2010 in Paris, these rugged products increase the ability of militaries to communicate and bring broadband data connectivity to the field, vehicles and command posts.

Continue reading "EB Releases Hardened IP VoIP Phone for Military & Defence Use" »

February 09, 2010

Fugitive VoIP hacker admits 10 million minute deal for $1 million

A Miami hacker has admitted he pocketed more than $1m by selling millions of minutes of voice over IP calls and surreptitiously routing them through the networks of telecommunications companies. Edwin Andrew Pena pleaded guilty to two felonies in connection with the hacking spree, which spanned the years 2004 through 2006, according to court documents. He was apprehended last year in Mexico after skipping out on a $100,000 bond secured by the mother of his then girlfriend.

Continue reading "Fugitive VoIP hacker admits 10 million minute deal for $1 million" »

January 05, 2010

General Dynamics Receives NSA Certification for Sectera vIPer Phone with PSTN Support

The National Security Agency (NSA) has certified the Sectera vIPer Universal Secure Phone enabled with Public Switched Telephone Network (PSTN) connectivity for voice communications classified at the Top Secret level and below.
The Sectera vIPer Phone with PSTN Connect allows U.S. military and government personnel to make both classified and unclassified calls using traditional telephone networks via one high-end office desktop phone. The Sectera vIPer Phone is a secure communication product manufactured by General Dynamics C4 Systems, a business unit of General Dynamics.

Continue reading "General Dynamics Receives NSA Certification for Sectera vIPer Phone with PSTN Support" »

June 16, 2009

Three indicted for hacking 2,500 company phone systems (PBX)

The acting U.S. attorney in New Jersey unsealed indictments Friday for three people in the Philippines charged with hacking the private branch exchanges (PBX) of more than 2,500 companies for stealing pass codes they sold to call center operators in Italy.

Italian officials allege the sale of the pass codes helped finance terrorist activities, IDG News Service reported. On Friday, Italian officials arrested at least five people in raids on 10 call centers.

Continue reading "Three indicted for hacking 2,500 company phone systems (PBX)" »

May 05, 2009

Tone Commander Intros Military-Grade Secure IP Phone - 7810 TSG-6

Tone Commander has introduced the industry’s first TSG-6 SIP-compliant phone. In addition, it announced that the National Telecommunications Security Working Group (NTSWG) has approved the device for government and military use.

The NTSWG, formerly known as the Telecommunications Security Group (TSG), is a Joint Working Group of the Committee on National Security Systems (CNSS), which was established under EO 13231 to protect National Security Systems. The TSG issued "standards" as the primary technical and policy resource for all aspects of the Technical Surveillance Countermeasures (TSCM) Program within the U.S. Intelligence Community. TSG Standard 6 (Updated January 2005) is a compilation of TSG-approved telephone security equipment. These items have been specifically evaluated by the NTSWG for security effectiveness.

Continue reading "Tone Commander Intros Military-Grade Secure IP Phone - 7810 TSG-6" »

April 21, 2009

Encrypting Voice Calls Between Offices and Mobile Cell Phones

Security vendor, Cellcrypt has announced an application which enables encrypted voice calls from smartphones to conventional office landline phones. The Cellcrypt PBX Gateway integrates with commercial office PBX systems and allows users to complete encrypted voice calls from existing landlines to mobile smartphones that are running Cellcrypt Mobile software.

Continue reading "Encrypting Voice Calls Between Offices and Mobile Cell Phones" »

September 15, 2008

Taliban using 'Internet phones' to evade MI6 in Afghanistan

Editor's Note:  It is true that technology can be used for good or bad.  The key is to try and not create situations where people are put into position where they fall into the latter.

Technology is like a double- edged sword. While it's being used by the British intelligence to track them down, the Taliban are effectively exploiting the Internet phones to evade detection in war-ravaged Afghanistan. 

The militants are using Skype, a popular piece of consumer software that allows free calls to be made over the web, to communicate with cells strung out across that country, the 'Daily Mail' quoted an intelligence source as saying. 

Continue reading "Taliban using 'Internet phones' to evade MI6 in Afghanistan" »

August 21, 2008

Phreakers take over FEMA phones – thousands lost to overseas calls

The Associated Press is reporting that calls made overseas from a hijacked FEMA phone system racked up a $12,000 USD bill. The Department of Homeland Security has confirmed the FEMA phone system was cracked, and the calls all took place over the previous weekend.

Continue reading "Phreakers take over FEMA phones – thousands lost to overseas calls" »

August 19, 2008

Coweta (GA) 911 now instantly maps cell phone calls

Most Cowetans who call 911 from their cell phones don't have to worry about location errors such as the one that may have contributed to the recent death of a woman in north Fulton County.

When a call comes in to Coweta's 911 center, the location instantly pops up on a map of the county on the operator's screen. Landline calls additionally show the address where the phone call originated.

Continue reading "Coweta (GA) 911 now instantly maps cell phone calls" »

August 07, 2008

General Dynamics Awarded NSA Contract to Add Switched Network Compatibility to the Sectera vIPer Universal Secure Phone

General Dynamics C4 Systems has been awarded a $2.8 million contract by the National Security Agency (NSA) to add a new Public Switched Telephone Network (PSTN) feature to the Sectera vIPer Universal Secure Phone.
The new feature, called "PSTN Connect," will enable the vIPer Phone to connect with traditional telephone networks, enabling users of secure desktop phones to use one secure phone on either PSTN or VoIP networks. The vIPer Phone currently operates on Internet Protocol (IP) networks.

Continue reading "General Dynamics Awarded NSA Contract to Add Switched Network Compatibility to the Sectera vIPer Universal Secure Phone" »

July 14, 2008

Massive DNS security problem endangers the internet

US-CERT and other security experts have warned of a critical design problem affecting all DNS implementations. The Domain Name Service is responsible for converting readable names like www.heise-online.co.uk into the IP addresses that computers can handle, such as DNS is thus the internet equivalent to a phonebook and without it, nothing works. Anyone who takes control of it can control the internet.

Continue reading "Massive DNS security problem endangers the internet" »

June 13, 2008

Let the SPIT (Spam over Internet Telephony) Wars Begin

If SPAM arrives in your inbox at 4am, the chances are your antispam software will catch it. But even if it doesn’t, you won’t lose much sleep over its arrival.  But it’ll be a different story with SPIT (spam over internet telephony). Junk phone calls at 4am are going to drive you mad because the chances are that antispit software won’t be able to intercept the call.

Continue reading "Let the SPIT (Spam over Internet Telephony) Wars Begin" »

October 10, 2007

Fake caller ID: Fun, Legal and Easy



Note:  He is right, you can't trust caller ID these days.  I do know that is someone sends no caller ID then I don't answer.  It's usually a telemarketer or some congressmen trying to give me an award for donating money to there party or associations.  In our current environment I am not sure how long that will last.  If you are trying to get in touch with your local press try changing it to some major organization's ID and see if your call gets picked up faster?  I bet it would.

He cited some legislation that was put through in 2007 and is currently stuck in the Senate.  "The law would outlaw causing "any caller identification service to transmit misleading or inaccurate caller identification information" via "any telecommunications service or IP-enabled voice service." Law enforcement is exempt from the rule."

Here is an excerpt from the article: 


Continue reading "Fake caller ID: Fun, Legal and Easy" »

June 18, 2007

VoIP Security Fundamentals

Note:  Computer Weekly has a great Monday morning article about VoiP security and how a PBX can affect it.

Voice over IP (VoIP) security is a challenge for IT staff because IP telephony (IPT) brings with it not only the security problems of data networks but also new threats specific to VoIP. In this fundamentals guide, learn about network security threats and emerging IP telephony threats, and how to secure your VoIP systems and endpoints from them.

Continue reading "VoIP Security Fundamentals" »

May 21, 2007

EP-880 VoIP Phone Uses Frequency Domain Scrambling Technology

Note:  If this phone is SIP compliant then we might need to pick a couple up for "testing".

Everpeace Technology has released the EP-880, an encrypted VoIP phone that integrates frequency domain scrambling technology and can block phone-tapping devices. It supports the PSTN network and standard PBX systems. 

Continue reading "EP-880 VoIP Phone Uses Frequency Domain Scrambling Technology" »

May 08, 2007

Next Alarm Announces Support for Two-Way Voice Monitoring

Next Alam is announcing at The Cable Show in Las Vegas support for two-way voice monitoring.  Next Alarm's two-way voice service, unlike that of other alarm companies, is compatible with VoIP (Voice over Internet Protocol) and digital phone service.  Next Alarm offers this feature for a minimal surcharge.  The feature doesn't require a phone line and is available at a very reasonable price.

Continue reading "Next Alarm Announces Support for Two-Way Voice Monitoring" »

April 05, 2007

Don't use WEP for Wi-Fi security (LOL)

Note:  3 Seconds is not much time.  Forget War Driving, now we will have "War Walking".  I run everything over WPA and only run sensitive data over a hardline.
The Wi-Fi security protocol WEP should not be relied on to protect sensitive material, according to three German security researchers who have discovered a faster way to crack it. They plan to demonstrate their findings at a security conference in Hamburg this weekend.
Mathematicians showed as long ago as 2001 that the RC4 key scheduling algorithm underlying the WEP (Wired Equivalent Privacy) protocol was flawed, but attacks on it required the interception of around 4 million packets of data in order to calculate the full WEP security key.

Continue reading "Don't use WEP for Wi-Fi security (LOL)" »

February 25, 2007

Interview With Encryption Advocate Phil Zimmermann Regarding VoIP

Note:  Very well executed interview about privacy, encryption and policy.  Usually I would give my opinion on a subject like this but I need to look deeper into this subject because it really goes to some core beliefs.  It is a very fine balance we must maintain in our wonderful free society.  I see where the government sees that it needs certain tools to help do their job of keeping us safe.  But on the other end this is AMERICA, the land of the free.  At a point I would say we are better off being free and maybe a little less safe and still have our basic privacy.  A free society is only as free as they assert imho. 
Phil Zimmermann has been an advocate of using technology to protect privacy for many years. He created Pretty Good Privacy, an email encryption program, as a tool to protect human rights. He figured that encryption was a way for people in totalitarian countries to escape government spying. He released it for free in 1991, but the U.S. government accused him of violating export control laws, which at the time restricted the use of strong encryption because it could help criminals evade law enforcement.

Continue reading "Interview With Encryption Advocate Phil Zimmermann Regarding VoIP" »

February 15, 2007

A Guide to Understanding the VoIP Security Threat

Note:  VN has a good article about VoIP Security threats how what to make of them.

"At its heart, a VoIP system is a data network. This means VoIP deployments are vulnerable to the same internal and external threats that plague any enterprise data local area network (LAN) or wide area network (WAN).

Enterprises pondering voice over Internet protocol (VoIP) primarily focus on the technology's cost benefits. Yet, in their zeal to converge voice and data networks and shave telephony costs, many organizations are failing to adequately consider VoIP's single drawback: security.

Continue reading "A Guide to Understanding the VoIP Security Threat" »

February 06, 2007

BorderWare Releases New Class of Enterprise VoIP Security

Note:  I came across this product today.  I like how they explain their approach using a self-proclaimed "non-proprietary solution" and open source operating system.  It seems the more we look at true security on our networks, the only way I can see us truly securing hardware is using a open source model so we can have alot of eyeballs examining the code and releasing patches faster so it stays secure.  People need to realize that securing a network is a goal and moving target.  The second you rest on your laurels and think you are secure thats the moment your most vulnerable because you have taken your eye off the ball.  Anyways here is the release we found:

"BorderWare Technologies has announced what it is calling a new approach to securing and servicing VoIP that is cost effective and highly scalable to meet the needs of today's service provider and enterprise markets. As VoIP security evolves, service providers and enterprises are realizing the need to secure their converged applications including VoIP, Video and other real-time applications, to protect from attacks such as toll fraud, service disruptions and Spam over Internet Telephony (SPIT)." 

Continue reading "BorderWare Releases New Class of Enterprise VoIP Security" »

January 29, 2007

VoIP security: Scenarios, challenges, and counter measures

VoIP combines the worst security vulnerabilities of IP networks and voice networks. This article discusses vulnerabilities, challenges and countermeasures in securing a VoIP network from the application right down to the hardware.

Continue reading "VoIP security: Scenarios, challenges, and counter measures" »

January 26, 2007

NEC Develops Technology to Prevent IP Phone SPAM called VoIP Seal

Note: Thank you NEC for getting started on this problem early in the game. 

NEC Corporation announced the development of new technology for the prevention of Spam over Internet Telephony (SPIT). VoIP SEAL, the new technology, which defends against the threat of rapidly increasing spam IP phone calls, is expected to contribute significantly to the realization of safe voice over internet protocol (VoIP) phone networks in the future. VoIP SEAL will be exhibited at NEC's booth at the 3GSM World Congress 2007, taking place in Barcelona, Spain from February 12 - 15.

Continue reading "NEC Develops Technology to Prevent IP Phone SPAM called VoIP Seal" »

January 22, 2007

VoIP Security Blogger, Mark Collier, Offers VoIP Security Trends and Predictions for 2007

Mark Collier, a voice over IP (VoIP) security scientist, author, and blogger, today announced the release of his “VoIP Security Trends and Predictions for 2007.” Mr. Collier’s prognostications have been posted to his popular VoIP security blog at: www.voipsecurityblog.com. Mr. Collier is CTO of SecureLogix Corporation, an enterprise telephony management and security company.

Continue reading " VoIP Security Blogger, Mark Collier, Offers VoIP Security Trends and Predictions for 2007" »

January 12, 2007

VoIP Scams, Phishing, And Denial Of Service Attacks and What You Can Do

VoIP-News is running a nice little informative piece discussing some of the general voip security issues that exist and some basic solutions people can take to minimize their exposure.  Below is an excerpt from the article:

"While enterprise VoIP offers many cost, efficiency and productivity benefits, it also opens the door to external threats. That's because VoIP is, at its heart, a data networking technology, making it a prime target for hackers, data thieves and other types of online troublemakers." 

Continue reading "VoIP Scams, Phishing, And Denial Of Service Attacks and What You Can Do" »

January 06, 2007

New Security Threats For VoIP

Panda Software looks at some scary security threats posed by VoIP. The top part of the article in IT-Observer looks at new ways that VoIP might be used for denial-of-service attacks, but the author, Fernando de la Cuadra, dismisses those threats as unlikely (too quickly, I think). The article then goes on to deal with possible threats posed by social engineering.

Continue reading "New Security Threats For VoIP" »

Recent Readers
Join Our Community
Nates PharmacyNates Pharmacy
View Reader Community
Join this Community
(provided by MyBlogLog)