Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Analysis, Inspection and Laboratory
LeftNav
Assisted/Independent Living
LeftNav
Clinical and Nursing Equipment
LeftNav
Design and Manufacture of Medical Equipment
LeftNav
Diagnostics Equipment, Monitoring and Test
LeftNav
Education, Training and Professional Services
LeftNav
Health Education and Patient Management
LeftNav
Health Estates Management
LeftNav
Healthcare Support and Information Services
LeftNav
Hygiene and Infection Control
LeftNav
IT and Communications in Healthcare
LeftNav
Materials
LeftNav
Medical Device Technology
LeftNav
Research and Development
LeftNav
Safety and Security
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Health Zone
Pro Security Zone
Web Lec
Pro Engineering Zone
 
 
News

IT security research shows how hackers can attack VOIP networks

Tier-3 : 27 November, 2007  (New Product)
Tier-3 has warned companies using Internet telephony (VOIP) of the security risk the technology poses.
Peter Cox, the ex-CTO of BorderWare, has left the firewall company he helped found, to establish a new VOIP consultancy. As part of this new initiative he has completed research and development of an Internet telephony eavesdropping application called SIPtap. “This type of application sounds a warning because it demonstrates the ease with which VOIP networks can be hacked and Intellectual Property stolen,' said Geoff Sweeney, CTO of Tier-3.

'The SIPtap demonstration package reportedly allows multiple VOIP call streams to be decoded on-the-fly and stored to hard disk as a .WAV file. The most worrying aspect of this is that the software can be loaded on to a company's internal systems using Trojan Horse malware,' Sweeney added.

According to Sweeney, tapping an organization's Internet telephony lines could result in the loss of all sorts of company and client confidential information, as well as company banking IDs and passwords.

'The fact that a complete VOIP phone eavesdropping application can be remote loaded on to a company's systems using a simple malware e-mail is very worrying,' he said.

'Companies need to review their IT security software arrangements and consider installing behavioural analysis software on their systems, as this is the only sure-fire method of preventing malware infections, even if employees `click through' on infected emails.'
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProHealthServiceZone.com
Netgains Logo