{"id":622,"date":"2005-02-08T00:00:00","date_gmt":"2005-02-08T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/02\/08\/voip-threats-must-be-dealt-with-now\/"},"modified":"2021-12-30T11:37:49","modified_gmt":"2021-12-30T11:37:49","slug":"voip-threats-must-be-dealt-with-now","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/02\/08\/voip-threats-must-be-dealt-with-now\/","title":{"rendered":"VoIP threats &#8216;must be dealt with now&#8217;"},"content":{"rendered":"<p>Nearly two dozen companies say they have allied to address spam and security risks of Internet telephones, even though there&#8217;s little evidence suggesting any threat.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The providers of voice-over-Internet Protocol (VoIP), as Net phone services are generally known, are bracing for abuses nonetheless.<\/p>\n<p>Using VoIP, virus writers could conceivably commandeer someone&#8217;s phone, or telemarketers could send messages to thousands more phones at a time than they can now.<\/p>\n<p>With little evidence to suggest a problem, however, the 22 member companies of the VoIP Security Alliance run the risk of provoking the digital world&#8217;s black hats.  <\/p>\n<p>But the outlaws&#8217; attention is inevitable, alliance members say, because VoIP technology is teetering on the mainstream, becoming an increasingly interesting target.  There are about 5 million customers worldwide, with almost a third in the United States.  Vonage, with 500,000 customers, is the world&#8217;s largest VoIP supplier and has recently started offering its services in the UK.  VoIP services have begun winning converts, thanks to cheap rates and a slew of features that traditional phone companies can&#8217;t match.<\/p>\n<p>The alliance includes business telephone maker Alcatel, network security specialists Symantec and several schools, including New York&#8217;s Columbia University, and the 20 other companies.  <\/p>\n<p>&#8220;The technology has finally arrived, and vulnerabilities need to be discovered and mitigated,&#8221; Ron Gula, chief technology officer of alliance member Tenable Network Security, said in prepared remarks.<\/p>\n<p>http:\/\/news.zdnet.co.uk\/communications\/0,39020336,39187096,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-622","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=622"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/622\/revisions"}],"predecessor-version":[{"id":3109,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/622\/revisions\/3109"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}