Free Newsletter
Register for our Free Newsletters
Analysis, Inspection and Laboratory
Assisted/Independent Living
Clinical and Nursing Equipment
Design and Manufacture of Medical Equipment
Diagnostics Equipment, Monitoring and Test
Education, Training and Professional Services
Health Education and Patient Management
Health Estates Management
Healthcare Support and Information Services
Hygiene and Infection Control
IT and Communications in Healthcare
Medical Device Technology
Research and Development
Safety and Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Health Zone
Pro Security Zone
Web Lec
Pro Engineering Zone

IT security research shows how hackers can attack VOIP networks

Tier-3 : 27 November, 2007  (New Product)
Tier-3 has warned companies using Internet telephony (VOIP) of the security risk the technology poses.
Peter Cox, the ex-CTO of BorderWare, has left the firewall company he helped found, to establish a new VOIP consultancy. As part of this new initiative he has completed research and development of an Internet telephony eavesdropping application called SIPtap. “This type of application sounds a warning because it demonstrates the ease with which VOIP networks can be hacked and Intellectual Property stolen,' said Geoff Sweeney, CTO of Tier-3.

'The SIPtap demonstration package reportedly allows multiple VOIP call streams to be decoded on-the-fly and stored to hard disk as a .WAV file. The most worrying aspect of this is that the software can be loaded on to a company's internal systems using Trojan Horse malware,' Sweeney added.

According to Sweeney, tapping an organization's Internet telephony lines could result in the loss of all sorts of company and client confidential information, as well as company banking IDs and passwords.

'The fact that a complete VOIP phone eavesdropping application can be remote loaded on to a company's systems using a simple malware e-mail is very worrying,' he said.

'Companies need to review their IT security software arrangements and consider installing behavioural analysis software on their systems, as this is the only sure-fire method of preventing malware infections, even if employees `click through' on infected emails.'
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo