7 Deadliest UC Attacks Chapter 3, "Eavesdropping and Modification", now available as free PDF download
As part of the publicity in the run-up to the book's release in a few weeks, Syngress has made a PDF available for free download of Chapter 3, "Eavesdropping and Modification". In the chapter, I talk about how you can use basic tools like Wireshark to eavesdrop on UC traffic and discuss some of the tools that can be found on the VOIPSA VoIP Security Tools list and how they can be used to both observe and modify traffic. I also suggest strategies for how to secure your UC systems against these attacks. The chapter is out there for free download... please feel free to share it... and I'd love to hear your feedback, either as comments here or over on the Facebook page for the book. Thanks!