InAardvark InfinitybyAardvark Infinity### VoIP Data Embedding: Hiding Sensitive Information Within Voice Call Metadata#### IntroductionAug 27
Vindaloo Softtech Pvt. LtdHow AI Helps in VoIP Fraud Detection and PreventionDo you think businesses now rely on traditional telephone networks? No!Feb 1
Randy AVoice Vulnerability ManagementOften times unified communication appliances and endpoints are overlooked when determining what’s in scope of our vulnerability…Oct 17, 2022Oct 17, 2022
InASSERTIONbyPradeep VasudevToll Fraud — what it is and how it works20 weeks, one article a week, and three minutes per article — that’s all you need to get the basics of voice security in place. In Week 2…Jul 4, 2022Jul 4, 2022
Maulik ShahSure-shot Signs That Your VoIP Security is CompromisedDespite making a shift to VoIP for business communications your telephone bills are high! Your staff is getting frequent fake anti-virus…Dec 6, 2021Dec 6, 2021
InAardvark InfinitybyAardvark Infinity### VoIP Data Embedding: Hiding Sensitive Information Within Voice Call Metadata#### IntroductionAug 27
Vindaloo Softtech Pvt. LtdHow AI Helps in VoIP Fraud Detection and PreventionDo you think businesses now rely on traditional telephone networks? No!Feb 1
Randy AVoice Vulnerability ManagementOften times unified communication appliances and endpoints are overlooked when determining what’s in scope of our vulnerability…Oct 17, 2022
InASSERTIONbyPradeep VasudevToll Fraud — what it is and how it works20 weeks, one article a week, and three minutes per article — that’s all you need to get the basics of voice security in place. In Week 2…Jul 4, 2022
Maulik ShahSure-shot Signs That Your VoIP Security is CompromisedDespite making a shift to VoIP for business communications your telephone bills are high! Your staff is getting frequent fake anti-virus…Dec 6, 2021
Sandro GauciBug discovery diaries: uncovering sngrep overflow issues with blackbox fuzzingTable of contentsJan 6, 2021