The FCC has passed the TRACED Act, requiring all communication service providers to implement STIR/SHAKEN and/or some form of robocall mitigation within their VoIP network or otherwise be subject to substantial fines and penalties.
Anytime someone answers a phone call and hears a recorded message instead of a live voice from a person, that’s a robocall. The message could be an appointment reminder from a dentist or healthcare provider, from a political party, or a message from charities. These are all legitimate, but what makes robocalls illegal is when they are from fraudsters trying to sell something to someone without their written consent, which, we all know, that’s most cases today.
Yealink, a global leading unified communication (UC) solution provider, is pleased to announce that Dect phone series – W60P, W56H DECT handsets and EXP50 Expansion Module are now also available for the Zoom Hardware as a Service (HaaS) Program. Yealink is offering customers a full range of phone portfolio including desk phones, dect phones, and conference phone for the program to fulfil communication needs in most of scenarios.
The Yealink W60P and W56H ensure premium capability for heavy call load with robust hardware, designed for on-the-move employees in industries like warehousing, catering and retail.
Internet service providers are seeing a spike in Voice-over Internet Protocol (VoIP) usage driven by the increased adoption of working from home during the Covid-19 pandemic. This has been reported by many companies in the space including Comcast, which has said that VoIP and video conferencing usage is up 210-285 percent since the start of the pandemic. With this in mind, it’s important to remember that whether VoIP systems are maintained internally or outsourced to a third-party vendor, they remain an extension of organizations’ attack surface that can fall victim to attackers.
VoIP systems are vulnerable to many threats including denial-of-service, metadata theft, traffic interception, and premium number scams. Threat actors can also use an insecure VoIP system as an entry point to compromise more sensitive networks or to divert attention from malicious activity elsewhere. Despite these vulnerabilities, VoIP systems do not typically receive much attention from IT departments.
Cybersecurity researchers today took the wraps off an on-going cyber fraud operation led by hackers in Gaza, West Bank, and Egypt to compromise VoIP servers of more than 1,200 organizations across 60 countries over the past 12 months.
According to findings published by Check Point Research, the threat actors — believed to be located in the Palestinian Gaza Strip — have targeted Sangoma PBX, an open-sourced user interface that’s used to manage and control Asterisk VoIP phone systems, particularly the Session Initiation Protocol (SIP) servers.
“Hacking SIP servers and gaining control allows hackers to abuse them in several ways,” the cybersecurity firm noted in its analysis. “One of the more complex and interesting ways is abusing the servers to make outgoing phone calls, which are also used to generate profits.
CounterPath is a company that started around 2002. We’ve sold millions of softphone clients that work across any SIP-based platform across the industry. We helped define the standard for SIP phones that everyone uses to this day.
For us, the user experience from UC starts with the softphone, because it’s the face of the service. It’s a very important component and something we’re known for providing in the industry.
Over the course of one weekend, the value proposition of collaboration went from it being about productivity to it being a necessity. That overnight necessity forced the hands of a lot of operations and IT workers to quickly get a solution in place.