TITLE

VoIP And Vanish

AUTHOR(S)
Armstrong, David
PUB. DATE
September 2005
SOURCE
Forbes Asia;9/19/2005, Vol. 1 Issue 2, p25
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on the prevalence of fraud and scams in the Voice over Internet Protocol (VoIP) service in the U.S. Providers of VoIP rely on open software standards and lack understanding of security. VoIP spam are unwanted advertisements that show up as messages in a user's account. VoicePulse, a VoIP service provider, developed a system that detects suspicious orders by grading each new customer on 50 different metrics such as calling location and billing address.
ACCESSION #
20957245

 

Related Articles

  • Open source group releases telephony services platform. Lawson, Stephen // Network World;9/9/2002, Vol. 19 Issue 36, p38 

    Announces the release of the telephony services platform, GNU Bayonne Version 1.0, which will allow developers to write open source applications for phone system functions such as call direction, voice prompts, voice mail and automated order processing. Companies that support telecommunications...

  • Is part of the future of VoIP open? Bradner, Scott // Network World;10/4/2004, Vol. 21 Issue 40, p30 

    This article comments on California Governor Arnold Schwarzenegger's order of a focused examination and assessment of the state government which resulted in a report that recommends implementing open source software and a VoIP system for the telephone system in order to save billions of dollars...

  • Securing VoIP provider's network boundary using Open Source SBC. Krgusic, Petar // TTEM- Technics Technologies Education Management;2012, Vol. 7 Issue 4, p1508 

    Protection of network integrity is one of the conditions which VOIP provider has to meet in order to enable SIP clients to connect on its system. The usage of SBC (Session Border Controller) is the most common and most reliable way of protection of VoIP provider's network boundary. The subject...

  • FIREWALL MAKER CROSSES THE POND TO EXPAND ITS CHANNEL. Lowinski, Jennifer // CRN;12/26/2005, Issue 1177, p33 

    The article reports on the plan of the computer security company SmoothWall to expand its channel in the U.S. The open-source firewall software that was developed by the company had a favorable outcome. The latest development in web security and content-filtering software adds protection against...

  • FIREWALL MAKER CROSSES THE POND TO EXPAND ITS CHANNEL. Lowinski, Jennifer // CRN;12/26/2005, Issue 1177, p33 

    The article reports on the plan of the computer security company SmoothWall to expand its channel in the U.S. The open-source firewall software that was developed by the company had a favorable outcome. The latest development in web security and content-filtering software adds protection against...

  • Get-rich-quick offers make Net a money pit. Goldsborough, Reid // New Orleans CityBusiness (1994 to 2008);03/26/2001, Vol. 21 Issue 40, p25 

    Focuses on the use of unsolicited e-mails by Internet scam artists. Examples of fraudulent e-mail solicitations; Difference from e-mails from bona fide businesses; Pyramid schemes promoted by scam artists on the Internet.

  • Asterisk.  // SC Magazine: For IT Security Professionals (UK Edition);Jun2008, p11 

    The article presents information on a zero-day threat affected Asterisk, a widely deployed softPBX from Digium. It is a foundation of Voice over Internet Protocol (VoIP) implementations and contains bugs affecting service. Bugs were discovered in Asterisk's session initiation protocol (SIP) code...

  • ASTARO PROTECTS VOIP NETWORKS. Neel, Dan // CRN;7/18/2005, Issue 1155, p47 

    This article reports that Massachusetts-based computer vendor Astaro Corp. this month launched a new Linux-based security appliance that gives solution providers multiple tools to fight threats, including new protection for VoIP networks. The vendor's new Security Gateway 420 gives Astaro...

  • Voice Spam.  // Network Dictionary;2007, p519 

    An encyclopedia entry for "Voice Spam" in information security is presented. It refers to unsolicited bulk messages broadcast over Voice over Internet Protocol (VoIP) to telephones connected to the Internet. It is also known as voice or VoIP spam or spam over Internet telephony. It relates the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics