1. Technology
Send to a Friend via Email

Security Issues

How secure is VoIP? Learn about the security issues related to VoIP, threats and dangers, prevention measures and precautions. Find more on VoIP security protocols and their use in VoIP networks.

Google Voice Privacy Threat - What Would You Do?
Google Voice Privacy Threat - Google Voice gives you a free number and many interesting features, including the free transcription into text of your recorded voice calls. But Google stores your call transcripts in a huge database that can even be indexed on Google's web searches. Also, other parties like hackers and mandated government officials can access your personal data. What would y…

JetNumbers
Jetnumbers Review - JetNumbers.com provides Virtual Phone Numbers, International Call Forwarding service in over 60 countries and more than 3000 area codes. You can use it to protect your personal number and hence your privacy.

Anonymous Phone Numbers
It is quite dangerous to give out your phone number to people you don't know. You will have to do that in many cases: online lists, new contacts, subscriptions etc. Fortunately, there exist services that give you an anonymous fake phone number that you can give here and there without fearing being spammed or harassed later on. Your caller or callee will know only the fake phone number while your …

VoIP Phishing - How To Prevent VoIP Phishing and Avoid Getting Trapped
Preventing VoIP Phishing - Here is what you can do to prevent VoIP phishing at home and in your company and avoid yourself and your friends from being hooked as a phishing victim.

VoIP Phishing - What is VoIP Phishing and How Does It Work
VoIP Phishing - Phishing is a type of attack that lures the user into giving personal information like passwords and credit card numbers over a website or phone. Phishing over VoIP is becoming rampant as VoIP makes phishing easier for attackers. In this article, we see what phishing is and how it works, and also how VoIP makes it easier.

Do Softphones Make My Network or Machine More Vulnerable?
VoIP Security - If you are within a network, yes, softphones do make your network more vulnerable, when compared to using IP phones. The main explanation to this is that a softphone is before all a piece of software that works with some devices, and like any other piece of software using a socket for Internet connection, it is exposed to some extent to the threats waiting behind the door. The extent to which you are vulnerable of course depends on how much your machine or network is protected.

Security Threats In VoIP
Security Issues in VoIP. While VoIP has become one of the mainstream communication technologies, VoIP users face a series of security threats. Let us see these security issues.

Making Your VoIP Secure
Security in VoIP has not been a very popular subject so far, but with the increasing demand for VoIP, it is becoming an important concern. VoIP security threats are increasing in number. Three things can be done to make VoIP more secure. Let us look at them.

Providing Secure VoIP Service
Most service providers are making big efforts to put adequate security measures into place. Most of them are not up to the level of reassuring users fully, though. This is why it is important that you consider security as one of the factors when choosing a service provider.

What is a Firewall?
A firewall is a piece of software (which may be coupled with hardware in some cases) that is designed to protect a private network from unauthorized access. A firewall normally blocks unwanted traffic from the outside to the inside of the network and vice versa.

VoIP: Do Not Overlook Security
You should not look only at the bright side of VoIP. While it revolutionizes voice and data communication, it does represent some thorny security issues that need to be dealt with properly.

VoIP Security: Threats, Defenses and Countermeasures
Learn about VoIP threats and discover measures and counter measures to overcome them, and enjoy a safe VoIP experience.

Why Over 90% of VoIP Services Are Vulnerable to Attack
You are in the crosshairs as a primary target of computer hackers if you own a computer or operate on un-secure VoIP (computer phone) services.

Phone Bill Cramming
What is Cramming? Cramming is an illegal practice, and therefore a fraud, that operators like phone service providers do to charge customers fees on their bills that they don’t know about. These ‘mysterious’ fees may be added to the bill as some additional cents that the customer will not care to check before paying, or as an additional service...

You can opt-out at any time. Please refer to our privacy policy for contact information.

©2014 About.com. All rights reserved.