Grand Idea Studio

Compromising Voice Messaging Systems

 

Voice mail systems and answering machines are an important part of the corporate information flow. However, they are frequently left unprotected and are overlooked when security assessments are performed. Access to these systems may yield valuable information and may assist attackers to further their attacks on the company’s computer infrastructure. This brief paper introduces the concept and methodologies of compromising voice mail systems and answering machines, provides vendor specific characteristics to aid in voice mail compromise, and contains a reference of related news reports, security advisories, and software tools.

Paper: Compromising Voice Messaging Systems

Originally released on the @stake website.

Press

The Security Ledger Podcast

Joe Grand on Unicorn Spotting and ...

Bloomberg Businessweek

The Big Hack: How China Used a Tiny ...

The New York Times

For Hackers, Anonymity Was Once ...