article thumbnail

Deception and Forensics for the Next Generation — Part 5: Phantom Attacker

SecureWorld News

The thing that jumps out at me is the operating system because there is no VoIP running on our test network. First, the attacker could be a rogue machine running a VoIP OS. Another possibility is that it is a legitimate device that just happens to be running VoIP. Figure 11 - Deception Net Log Showing a Failed Login Attempt.

VOIP 52
article thumbnail

Fountainhead: The End of the Laptop-Centric World?

Fountainhead

Whenever Margo does remote work with a given client -- accessing the intranet, using internal apps, interacting via collaboration software, or even certain VoiP apps -- she must use the appropriate laptop. All a user needs is a client device (laptop, iPad, smartphone) and a secure authentication mechanism.