Category: VoIP

Govt to stop wiretap reform – Bonafede

[section_tc][column_tc span=’12’][h_tc type=’2′] Freezing of case time-outs after 1st ruling being considered[br_tc][br_tc]Redazione ANSA [/h_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] (ANSA) – Rome, July 11 – Justice Minister Alfonso Bonafede said Wednesday that the government will sink a reform of the use of wiretaps in investigations that was approved by the previous centre-left administration. “The wiretap reform will be stopped because the modifications introduced appear a harmful step back on the road…

Comparison of VoIP and TETRA Regarding Security in a Safety Critical Environment

[section_tc][column_tc span=’12’ trigger_pt=’0′ duration=’1000′ delay=’0′][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] In this document, University of Applied Sciences FH Technikum Wien (Vienna, Austria) analyze security threats on VoIP (Voice over IP) and TETRA (Terrestrial Trunked Radio) solutions and mitigation techniques. [nbsp_tc] [/text_tc][spacer_tc pixels=’10’][/spacer_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] Conclusion [/text_tc][spacer_tc pixels=’10’][/spacer_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] “We recommend Tetra for safety critical environments like vessel and port terminal operations, Airports and government emergency authorities….

Researchers propose novel solution to better secure voice over internet communication

[section_tc][column_tc span=’12’][image_tc url=’https://www.shapestones.co.uk/wp-content/uploads/2018/01/secure_voice_web.jpg’ timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′ link=’http://www.uab.edu/news/research/item/9071-researchers-propose-novel-solution-to-better-secure-voice-over-internet-communication’ target=’_blank’][/image_tc][text_tc timing=’linear’ trigger_pt=’0′ duration=’1000′ delay=’0′] Researchers at the[nbsp_tc][nbsp_tc]University of Alabama at Birmingham[nbsp_tc]have developed a novel method to better protect Crypto Phones from eavesdropping and other forms of man-in-the-middle attacks. Crypto Phones consist of smartphone apps, mobile devices, personal computer or web-based Voice over Internet Protocol applications that use end-to-end encryption to ensure that only the user and the person they are communicating…