As part of the publicity in the run-up to the book's release in a few weeks, Syngress has made a PDF available for free download of Chapter 3, "Eavesdropping and Modification". In the chapter, I talk about how you can use basic tools like Wireshark to eavesdrop on UC traffic and discuss some of the tools that can be found on the VOIPSA VoIP Security Tools list and how they can be used to both observe and modify traffic. I also suggest strategies for how to secure your UC systems against these attacks. The chapter is out there for free download... please feel free to share it... and I'd love to hear your feedback, either as comments here or over on the Facebook page for the book. Thanks!
Are you on Facebook? If so, please consider becoming a fan of the Facebook page for the Seven Deadliest Unified Communications Attacks. I'll be using the page to provide updates about security resources related to the book, link to some video and audio sessions, mention upcoming interviews and more. Some of that I will also post here on the blog site... but there will be other content there, too. So please... become a fan and join in the journey and conversation!