The History of telecommunications hacking – and why we still need to learn from it
“Telecommunications is like the bloodstream of business: it flows ceaselessly, connects everything, and operates unnoticed—until someone interferes.” Today, it is natural for companies to use mobile phones, VoIP calls, SMS, or even networks of IoT devices...
A real-world network security case study: A critical VoIP device in an unsegmented network
Introduction – why is a network security audit important? In the digital age, the security of a company’s IT infrastructure is critically important. Often, only a thorough IT network security audit can uncover the hidden flaws that can lead to serious...