Monthly Archives: March 2010

7 Deadliest UC Attacks Chapter 3, “Eavesdropping and Modification”, now available as free PDF download

As part of the publicity in the run-up to the book's release in a few weeks, Syngress has made a PDF available for free download of Chapter 3, "Eavesdropping and Modification".  In the chapter, I talk about how you can use basic tools like Wireshark to eavesdrop on UC traffic and discuss some of the tools that can be found on the VOIPSA VoIP Security Tools list and how they can be used to both observe and modify traffic.  I also suggest strategies for how to secure your UC systems against these attacks.  The chapter is out there for free download… please feel free to share it… and I'd love to hear your feedback, either as comments here or over on the Facebook page for the book.  Thanks!

The book is…. done! Now just a wait until printing…

Yea! I sent off my final edits on the final “page proofs” tonight… Now the Production Editor at Syngress will incorporate my changes and do a final check… and then the Seven Deadliest Unified Communications Attacks goes to print!

My part is done, though. Next time I have any interaction with the book will be when a printed copy shows up here at my home! Great to have passed this milestone… looking forward to seeing it…

Become a Facebook Fan of 7 Deadliest UC Attacks!

Are you on Facebook? If so, please consider becoming a fan of the Facebook page for the Seven Deadliest Unified Communications Attacks. I’ll be using the page to provide updates about security resources related to the book, link to some video and audio sessions, mention upcoming interviews and more. Some of that I will also post here on the blog site… but there will be other content there, too. So please… become a fan and join in the journey and conversation!

Thanks.