Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

VoiP Softphone hack demonstration.

Tier-3 : 02 August, 2007  (Technical Article)
Notebook hack achieved using softphone over Wi-Fi to take control of computer.
The Viper Lab division of Internet telephony security specialist Sipera caused a stir at Wednesday's Black Hat USA IT security convention when researchers showed how easy a VOIP softphone was to hack.

In its demonstration, Sipera highlighted one of several VOIP security flaws which allow hackers to take control of a laptop running a standards-based VOIP softphone.

During the demo - part of the Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones presentation - researchers showed how it is possible to remotely modify and even delete files on a VOIP-enabled notebook PC without permission from the local user.

Commenting on the demonstration, Geoff Sweeney, CTO of behavioural analysis IT security vendor Tier-3, said that Sipera's research shows how new security flaws are generated whenever new leading edge technology arrive in the marketplace.

'Sipera has shown how conventional IT security software can be bypassed using flaws in a standards-based VOIP softphone. It illustrates the clear need that all computer users have for next generation IT security software, which includes behavioural analysis as a standard feature, in order to lock down previously unknown threats before they cause any damage,' he said.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo