How to hack IP voice and video in real-time

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

How to hack IP voice and video in real-time


How to hack IP voice and video in real-time

Posted: 20 Sep 2010 09:00 AM PDT


Corporate video conferences can still be easily hacked by insiders using a freeware tool that allows attackers to monitor calls in real-time and record them in files suitable for posting on YouTube.

Two-Form Authentication Gives Reason to Consider Google Apps

Posted: 20 Sep 2010 09:00 AM PDT


Google announced that it is implementing two-factor authentication for Google Apps to improve security. The introduction of more stringent authentication controls removes one of the hurdles for businesses to embrace Google Apps and makes the productivity suite a more viable option for organizations concerned with security in the cloud.

Fear of data loss, social media security risks rising

Posted: 20 Sep 2010 09:00 AM PDT


A new survey from California-based email security firm Proofpoint finds more organizations are dealing with data loss and security breaches due to employee use of social media sites. Proofpoint polled 261 IT decision makers at organizations with more than 1000 employees. Respondents were asked about the frequency of data loss events in the past 12 months, as well as their concerns, priorities and policies related to email, the Web, social media and other sources of data loss risk.

iPhones, iPads secure enough, but what about Android devices?

Posted: 20 Sep 2010 09:00 AM PDT


Apple has done enough security-wise with its iPhone and iPad to make many CSOs comfortable with the mobile devices connecting to corporate networks, but Google's Android still has a ways to go.

Twitter user threatened over speed camera tweets

Posted: 20 Sep 2010 09:00 AM PDT


South African police have threatened a Johannesburg Twitter user with arrest for using the social media site to tweet regular updates on police road blocks and speed cameras.

Lily Allen sues Apple over hacked laptop

Posted: 20 Sep 2010 09:00 AM PDT


Pop singer Lily Allen is reportedly suing Apple over a hacked laptop.

How to hack IP voice and video in real-time

Posted: 20 Sep 2010 09:00 AM PDT


Corporate video conferences can still be easily hacked by insiders using a freeware tool that allows attackers to monitor calls in real-time and record them in files suitable for posting on YouTube.

Adobe moves up Flash fix, will patch bug today

Posted: 20 Sep 2010 09:00 AM PDT


Adobe accelerated the delivery of a patch for a critical vulnerability in Flash and will ship the fix today, rather than next week as originally scheduled.

Google adds two-factor authentication option to Google Apps

Posted: 20 Sep 2010 09:00 AM PDT


Google added a two-factor authentication option to Google Apps on Monday, allowing enterprises to protect user accounts with a one-time code delivered through a mobile phone, in addition to the usual password.

Increasing security of SCADA systems in power industry

Posted: 20 Sep 2010 09:00 AM PDT


In this sixth article in a series focusing on the need for improved information assurance and cyber situational awareness in the electric power industry, we continue a survey of government and industry consensus about the need for increased security of SCADA systems in the power industry.

News quiz: The week in tech

Posted: 17 Sep 2010 09:00 AM PDT


Microsoft re-enters the browser game, Twitter aims for microfame

Quantum computing boosted by 'photon walk' chip

Posted: 17 Sep 2010 09:00 AM PDT


Scientists led by a Bristol University team have pioneered an experimental method for quantum computers to perform calculations using photons travelling inside a silicon chip.

0 comments:

Post a Comment