Light Reading
Threats to listen for as you implement WiFi VOIP, and how to stop at least some of them

Five WiFi VOIP Security Issues

Dan Jones
LR Mobile News Analysis
Dan Jones, Mobile Editor
2/16/2006
50%
50%

As enterprise deployments of WiFi VOIP systems reach the staging point, security will be a key concern for enterprise users.

Shawn Merdinger, an independent security consultant based in Austin, Texas, has worked with Cisco Systems Inc. (Nasdaq: CSCO) and 3Com Corp. (Nasdaq: COMS)/Tipping Point. He's tested around a dozen WiFi VOIP handsets and deskphones and says that security problems range from potential denial-of-service attacks to more serious issues that allow "deep access" to the device that lets a remote attacker read sensitive information on the phone.

You can see his postings on many of the devices tested, along with some workarounds here. In the wake of Merdinger's findings, Cisco Systems Inc. (Nasdaq: CSCO), Hitachi Ltd. (NYSE: HIT; Paris: PHA), and UTStarcom Inc. (Nasdaq: UTSI) have issued firmware upgrades for the devices in question. (See WiFi VOIP: How Safe?.)

Such threats are inevitable. So it's up to vendors to forestall them, according to analyst Paul Stamp, of Forrester Research Inc. "It's security 101. If we see practices like this continue as these devices get more popular then the manufacturers will only have themselves to blame when there's a widespread attack," he notes.

Still there are steps users can take to protect themselves. Here's a Top 5 list of enterprise WiFi VOIP security issues, and some ways to guard against them:

Widespread deployment equals a security headache:
Because of the "ubiquity of deployment" in many enterprises, attacks can spread quickly and be targeted to take down multiple devices at once. IT managers should stay up to the minute with phone upgrades, and consider running phones over a separate physical or virtual LAN as a defense against these attacks.

Many points of attack:
As the phones get more sophisicated, so could the points of entry for malicious attacks increase. Bluetooth, email, client Web browsers, SMS, WiFi, media players, and image viewers could open back doors for hackers. Though users can use open-source and commercial tools to continually test their phones and networks, they'll ultimately have to rely on vendors to do proactive testing on these devices. "Some vendors may engage in this testing while the majority will not," warns Merdinger.

Targeting phones in public environments:
For example, a Bluetooth scanner could be hidden at the entrance to a major airport or train station and be used to grab user data. It may be best to keep Bluetooth and other wireless features swicthed off when not needed.

Rogue again:
Meanwhile, at the office and on the road, users and IT departments will have to keep their guard up and scan for rogue access points. Hackers will set up access points to specifically target WiFi phones in the corporate space as well as at hotels, conferences, and other places business people like to congregate. Good device authentication and encryption can help provide protection here.

Targeted attacks:
Targeted attacks on specific voice-over-wireless networks could also be an issue, albeit one that the victims may try to downplay. "There will be targeted attacks on VoIP networks [from hackers or competitors] that will be kept quiet if there is no legal requirement for disclosure or obvious public knowledge," Merdinger says.

Users, however, shouldn't get in a snit about VOIP calls that are often unencrypted and therefore easier to listen in on. Unless attackers are targeting a specific user, it is much simpler to find useful information sent by the user or held on the phone than to listen in on calls, even if you're the NSA.

"Most attackers are going to go after text information -- much easier to parse for the juicy information," says Merdinger.

— Dan Jones, Site Editor, Unstrung

(0)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
Flash Poll
From The Founder
It's clear to me that the communications industry is divided into two types of people, and only one is living in the real world.
Jonestown
Mobile Backhaul: Going to the Dark Side?

10|30|14   |   2:26   |   (1) comment


Heavy Reading's Patrick Donegan shares his view on a dark trend that bubbled up at Light Reading's annual backhaul conference in NYC.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With CEO of SwitchCom

10|30|14   |   4:13   |   (0) comments


SwitchCom, an IT company based in Angola, recommends a variety of Huawei solutions and hardware to their customers in the energy industry.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With Ethiopia's Ministry of Water Irrigation & Energy

10|30|14   |   4:08   |   (0) comments


Gosaye Mengistie of Ethiopia's Ministry of Water Irrigation & Energy discusses the collaboration with Huawei in that country.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview with Dongfang Electronics Corporation

10|30|14   |   5:46   |   (0) comments


Dongfang Electronics Corporation, headquartered in Chengdu, China, is one of China's largest manufacturers of power generators and contractors of power station projects.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview with Zimbabwe's Customers

10|30|14   |   3:31   |   (0) comments


Representatives of Zimbabwe's Ministry of Power and Development discuss the energy needs of their country as well as new areas of improvement due to enhanced ICT capabilities.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With Colbún Chile

10|30|14   |   4:29   |   (0) comments


In Chile, an aging energy infrastructure was in dire need of a modern update. Claudio Valenzuela of Colbún discusses how Huawei's ICT solutions continue to provide crucial information to improve the grid and how an in-country engineer is a cricial asset.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With YuLiao

10|30|14   |   6:27   |   (0) comments


Yu Liao, chairman of the Chinese Association for Renewable Energy in Germany, discusses the role that ICT solutions play in helping to grow renewable energy resources in Germany.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview

10|30|14   |   2:54   |   (0) comments


Sifang has been working with Huawei on several projects. JingTao Wu, Assistant President of Beijing Sifang Automation Co. Ltd., believes that the cooperation with Huawei can facilitate Sifang's process of internationalization.
LRTV Huawei Video Resource Center
A Better Connected Smart Grid: Powering Laos

10|30|14   |   5:38   |   (0) comments


Representatives of Electricite Du Laos (EDL), a state-owned corporation, discuss the importance of ICT solutions in serving their country's energy needs.
LRTV Huawei Video Resource Center
2014 Huawei Electric Power Industry Summit: Interview With Junwei Lu

10|30|14   |   4:50   |   (0) comments


Professor Junwei Lu of Griffith University Australia describes his work with micro grid technology and the future of the power industry.
LRTV Documentaries
The Next-Gen Network Disconnect

10|29|14   |   01:23   |   (2) comments


There's a lot of talk about making networks more simple with SDN, NFV and next-gen broadband technology – but what about the complexity of introducing such capabilities?
LRTV Custom TV
Grow Your VPN Service Revenue

10|27|14   |   4:00   |   (0) comments


Watch how CSP product managers can better differentiate and maximize the value of their Internet, VPN and cloud services for business services customers, by adding premium application performance visibility to their data services.
Upcoming Live Events
November 6, 2014, Santa Clara
November 11, 2014, Atlanta, GA
December 2, 2014, New York City
December 3, 2014, New York City
December 9-10, 2014, Reykjavik, Iceland
February 10, 2015, Atlanta, GA
May 6, 2015, McCormick Convention Center, Chicago, IL
May 30, 2015, The Westin Peachtree, Atlanta, GA
June 9-10, 2015, Chicago, IL
Infographics
WhoIsHostingThis.com presents six of the world's most extreme WiFi hotspots, enabling the most epic selfies you can imagine.
Hot Topics
Microsoft's Skype Embraces WebRTC on IE
Sarah Reedy, Senior Editor, 10/27/2014
FTC Slaps AT&T With Throttling Lawsuit
Sarah Reedy, Senior Editor, 10/28/2014
Wheeler Gets Down With OTT
Mari Silbey, Independent Technology Editor, 10/29/2014
China's MVNOs Hit the Wall
Robert Clark, 10/27/2014
Let's Not Kill SDN & NFV With Silos
Francois Locoh-Donou, Senior VP, Global Products Group, Ciena, 10/28/2014
Like Us on Facebook
Twitter Feed