First page Back Continue Last page Graphics
About this Presentation
Snapshot of the current state of VoIP security
All attacks discussed are problems today
Making the case that attack tools are both available and mature
Divided into three sections:
- Briefly, VoIP Basics
- Attacks (Vulns, Attacks, Impact, Tools, Mitigation)
- Problems with suggested mitigation actions
I’ll be discussing only technical attacks; not social attacks like SPIT, Phishing, etc.
Tim Burton is the MAN.