Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Cisco Hits 50 Million Milestone For Its IP Phones

April 26, 2012 by  
Filed under Around The Net

Comments Off on Cisco Hits 50 Million Milestone For Its IP Phones

Cisco Wednesday announced Wednesday that it has sold its 50 millionth IP phone, a significant increase in just two years when 30 million were sold.

The switching technology giant today also said it will make software for presence, instant messaging and Cisco Jabber IM clients available for free to its Unified Communications Manager customers.

The latter move means organizations with UCM can roll out presence and IM to employees simply and cheaply to smartphones and tablets running various operating systems, Barry O’Sullivan, senior vice president of Cisco’s voice technology group, said in a blog post.

The supported OSs include Windows, Mac, iPad, Cisco Cius, iPhone, BlackBerry and, later in 2012, Android, O’Sullivan said.

The move helps companies “deploy a unified communications client that is BYOD-ready,” he added. BYOD refers to Bring Your Own Device, a trend where companies allow workers to use devices of their choosing to connect to company data wirelessly.

Source…

VoIP Ideal Platform For Controlling Botnets

August 16, 2011 by  
Filed under Internet

Comments Off on VoIP Ideal Platform For Controlling Botnets

Botnets and their masters can communicate with one other by calling into the same VoIP conference call and exchanging data using touch tones, researchers demonstrated at Defcon.

This gives the botmasters — whose top goals include remaining anonymous — the ability to issue orders from random payphones and disposable cellular phones, say researchers Itzik Kotler and Iftach Ian Amit of security and risk-assessment firm Security Art.

Using phones and the public phone networks eliminates one of the prime tools bot fighters have: taking down the domains of botnets’ command and control servers, the researchers say. If the botmaster isn’t using a command and control server, it can’t be taken down.

In fact, the botmaster can communicate with the zombie machines that make up the botnet without using the Internet at all if the zombies are within a corporate network. So even if a victim company’s VoIP network is segregated from the data network, there is still a connection to the outside world.

In addition to its stealth, the VoIP tactic employs technology that readily pierces corporate firewalls and uses only traffic that is difficult for data loss prevention software to peer into. The traffic is streamed audio, so data loss prevention scanners can’t recognize patterns of data they are supposed to filter, the researchers say.

The downsides of VoIP as a command channel are that it severely limits the number of zombie machines that can be contacted at once, and the rate at which stolen data can be sent out of a corporate network is limited by the phone system. But Kotler and Amit say the connections are plenty big to send commands in.

During their demo at the conference, the pair had an Asterisk open source IP PBX stand in as the corporate PBX. A virtual machine representing a zombie computer on a corporate network called via TCP/IP through the PBX and into a corporate conference call. A BlackBerry, representing the botmaster dialed in over the public phone network to the same conference call.

Read More…