article thumbnail

Deception and Forensics for the Next Generation — Part 5: Phantom Attacker

SecureWorld News

The thing that jumps out at me is the operating system because there is no VoIP running on our test network. First, the attacker could be a rogue machine running a VoIP OS. Another possibility is that it is a legitimate device that just happens to be running VoIP. 222 are virtual machine interfaces—decoys created by the BOTsink.

VOIP 52
article thumbnail

Fountainhead: The End of the Laptop-Centric World?

Fountainhead

Insights into Data Center Infrastructure, Virtualization, and Cloud Computing. Whenever Margo does remote work with a given client -- accessing the intranet, using internal apps, interacting via collaboration software, or even certain VoiP apps -- she must use the appropriate laptop. skip to main | skip to sidebar. Fountainhead.