Synopsis: VoIP security news, comments and opinions
Welcome to Blue Box: The VoIP Security Podcast show #7, a 28-minute podcast from Dan York around news and commentary in the world of VoIP security.
Download the show here (MP3, 26MB) or subscribe to the RSS feed to download the show automatically.
Comments, suggestions and feedback are welcome either as replies to this post or via e-mail to [email protected]. Audio comments sent as attached MP3 files are definitely welcome and will be played in future shows. You may also call the listener comment line at +1-206-338-6654 to leave a comment there.
Jonathan was travelling this week and unable to participate. We mentioned previously that Bogdan Materna from VoIPShield Systems would be interviewed this week but unfortunately he fell ill and was unable to join us. We'll reschedule that interview in the weeks ahead. Our thanks go out to Tom Cross of Techtionary.com, who provided some content for today's show.
Show Content:
- 00:20 - Intro to the show, contact information and how to provide comments. Welcome to all the new listeners.
- 02:22 - Mention of upcoming interviews: SecureLogic, VoIP Shield, potentially Qovia
- 03:55 - Comments section - first comment in from Scott Berkman offering a new logo (see the image to the right). Many thanks, Scott! Comments are welcome.
- 05:59 - Chuck Tanowitz from Schwarz Communications pitching an interview with Qovia
- 06:58 - Paul Sorge at HP Procurve finds the podcasts useful and likes the intro with phones
- 07:21 - Mike Strock mentions the show in his blog and finds the phone intro extremely annoying
- 08:16 - Rick Robinson at Avaya comments on the real versus perceived threats to VoIP
- 09:33 - The PR firm for NetClarity contacted us about NetClarity's patent filing
- 10:29 - Craig Bowser sent in a link to a SecurityPipeline article on 3Com's new switch with VoIP capabilities - see also the 3Com's news release
- 12:20 - Wrapup of comments and information about sending in comments
- 13:08 - News section - Der Spiegel article on attack against cell phone voicemail and the linkage to VoIP (in German - a very brief English summary is available)
- 15:55 - ComputerWorld Australia: Fluke to acquire Visual Networks - see also the Fluke news release
- 16:45 - Bank Technology News: Voip Security Threats: Swimming With The Sleeping Sharks?
- 17:52 - ZDNet: Attention Skype-haters: SkypeKiller lets you wipe Skype from your network for good
- 18:04 - Business Week: Getting skittish about Skype (a sidebar to a larger article)
- 19:39 - LightReading: Verso responds to Skype
- 20:15 - ZDNet: Mass mailer worm maquerades as Skype update
- 21:24 - Network World: VoIP scheme gets big backers which includes an audio interview with Cullen Jennings of Cisco about ICE and a mini-tutorial on the topic
- 21:59 - Mini-feature: Tom Cross (of Techtionary.com) asks if companies are developing policies around the monitoring of VoIP calls
- 24:01 - Review of the last week's traffic on the VOIPSEC public mailing list. Major topics this week included a request for contacts for people interested in VoIP fraud (i.e. billing abuse) and a discussion of whether RTP could be a transport for viruses.
- - Request for feedback - Do you find this VOIPSEC review section of the show useful? Please send comments to [email protected].
- 25:55 - Final comments - looking for suggestions for the lists of VoIP podcasts and VoIP security books currently on the side of the podcast weblog
- 26:32 - Wrapup of the show and information about how to provide comments.
- 28:04 - End of show
Comments, suggestions and feedback are welcome either as replies to this post or via e-mail to [email protected]. Audio comments sent as attached MP3 files are definitely welcome and will be played in future shows. You may also call the listener comment line at +1-206-338-6654 to leave a comment there.
Thank you for listening and please do let us know what you think of the show.
Dan, I listened to the discussion about recording IPT calls. I am not aware of any procedures and policies, but will say that we have been working with one of the major security companies to investigate an application which monitors calls for keywords. The idea is to detect when employees leak sensitive info, such as when an acquisition is about to take place. I don't know if we will ever build this, but it does raise some interesting questions, like are the rules for monitoring IPT going to be like traditional voice or more like data. Will enterprises start monitoring all calls, just like they can now with email and IM. We will see.
PS, encryption is generally useless as a countermeasure, when the call is translated by a media gateway to TDM. Just monitor on the TDM side.
Posted by: Mark Collier | December 13, 2005 at 04:36 PM