Three ways Mac users can get infected by the OSX/RSPlug Trojan horse

This video describes how Mac users can get infected by the OSX/RSPlug – DNSchanger Trojan horse. For more information about this trojan threat, visit our company blog : http://blog.intego.com/2009/07/02/new-variant-of-the-rsplug-trojan-horse/ http://blog.intego.com/2009/06/24/hacking-twitter-to-spread-mac-malware/ http://blog.intego.com/2009/06/19/new-rsplug-trojan-horse-variant-found-on-game-sites/ http://blog.intego.com/2009/06/16/whats-in-a-name-new-trojan-is-variant-of-old-trojan/ http://www.intego.com/news/ism0705.asp source

VoIP Security Roundtable (1 of 5)

VoIP Security Roundtable with Bob Bradley (Product Line Manager of Sonus Networks), Ken Kuenzel (Founder and CTO at Covergence), James Taylor (Director Sustaining Engineering of Global Crossing) and Stephane Teral (Principal Analyst at Infonetics Research.) (c) 2008 Stealth Communications. Recorded at Voice Peering Forum (voicepeeringforum.com.) Part 1 of 5 source

VoIP Security Hacker Film : 01 : Bank

Think your Voice over IP is Secure? Think Again. View this dramatization of hacking into a financial institution’s VoIP telephony system and see how vulnerable enterprise VoIP systems are. Need to secure your VoIP? Think VoIP IPS or ViPS! Film by Aimee Britten source