Cisco SIP based phones have SIP extensions that use the SIP protocol for Cisco proprietary operations like registering a Cisco SIP phone by MAC Address. This blog will take a high level look at ...
Today as expected, Cisco announced they have finally embraced SIP (Session Initiation Protocol). The platform for doing so will be Cisco Unified CallManager5.0, the call-processing component of the ...
Cisco stomped out a critical vulnerability in its IP Phone web server that could enable remote code execution by an unauthenticated attacker. Cisco is warning of a critical flaw in the web server of ...
Cisco has disclosed today a high-severity zero-day vulnerability affecting the latest generation of its IP phones and exposing them to remote code execution and denial of service (DoS) attacks. The ...
Let’s say the doors and windows are all closed, all cell phones in the room are on Airplane mode as you and your business partners discuss some super-secret save-the-world formula. But “just because ...
The most serious vulnerabilities in Cisco’s 8800 Series IP Phones could allow unauthenticated, remote attackers to conduct a cross-site request forgery attack or write arbitrary files to the ...
John Breeden II is an award-winning reviewer with more than 20 years of experience covering technology. Follow him on Twitter @TheLabGuys. Office phones have come a long way in a relatively short time ...
Ang Cui has spent 10 years hacking into internet-connected office phones and other “embedded devices”—that is, devices that don't look like computers or servers but have all the trappings: a processor ...
Cisco IP phones, which can be found in many offices, have a security vulnerability that lets hackers take total control of them from the outside. A team of computer scientists at Columbia University ...
This blog will be a break from the H.323 blog series I’m currently doing to discuss EoS and EoL information related to Cisco phones. One of my students has recently told me that Cisco would not sell ...
Cisco and Ubiquiti have released security updates that close high-rated VoIP vulnerabilities. There is no known active exploitation yet. Nevertheless, IT managers should proceed and install the ...
Many South African businesses are transitioning from traditional copper-based telecommunications to voice-over-Internet-protocol (VoIP) solutions, and several IP phone brands are available in the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results