Telecom fraud is a huge problem globally. Asterisk is difficult to set up in a secure configuration so Asterisk fraud has led to big bills for many users. Similarly on premise systems have been compromised through voicemail exploits, call transfer exploits and poor password management. We have implemented solutions to mitigate toll fraud, hacking attempts, brute force attacks, scanners etc. The articles in this section promote a layered and multi-disciplined approach to monitoring, reacting and attempting to ongoing attacks against VoIP and traditional telephone systems.
There are many aspects to phone system security which apply to both traditional and internet based telephony. Voice over IP (VoIP) systems bring additional threats, but offer some mitigations.In this…