VoIP Security Vulnerabilities

by David Persky Sept. 1, 2017 via SANS Institute

Since the dawn of time, humans have tried to communicate with each other. As languages and dialects prospered, the forms of communication became more advanced by using letters in various alphabets and writing messages on papers or letters. From the Caeser cipher that Julius Caesar used where letters in encrypted messages were actually three letters off, to the Nazis in WWII who built and used the Enigma machine to encrypt military communications, to SIP-TLS to encrypt VoIP conversations, as forms of communication have advanced there have been subsequent efforts to keep those communications secret by one party, and to identify the clear message by a second party.


Irina Alexandra Negrii 2 days, 18 hours ago

VoIP related systems are no more secure than other common computer systems.. this systems have their own operating system, they have IP addresses, and they’re accessible on the network.