5 Compelling Reasons Not To Manage Your Own VoIP Server

5 Compelling Reasons Not To Manage Your Own VoIP Server

Voice over Internet Protocol does away with bulky desk phones and tangled wires, but it introduces something you didn’t need before: a VoIP server. It powers all the standard VoIP features, like call forwarding, recording, and voicemail, plus advanced tools, like call queues, interactive voice response, and integrations. In other words, you can’t use a VoIP system without a VoIP server. You can manage the server yourself, which is not recommended for most, or leave…

Read More

BlastRADIUS Vulnerability Discovered in RADIUS Protocol

BlastRADIUS Vulnerability Discovered in RADIUS Protocol

Cyber security researchers have exposed a vulnerability in the RADIUS protocol, dubbed BlastRADIUS. While there is no evidence that threat actors are actively exploiting it, the team is calling for every RADIUS server to be upgraded. What is the RADIUS protocol? RADIUS, or Remote Authentication Dial-In User Service, is a networking protocol that provides centralised authentication, authorisation and accounting for users connecting to a network service. It is widely used by internet service providers and…

Read More

10 Security Tips for Business Travellers This Summer

10 Security Tips for Business Travellers This Summer

Now the weather is hotting up, many workers may be considering spending some time away from their desk. You may be more inclined to head to that conference in Barcelona or take a trip with the family but keep the company phone on you. Whether you’re hopping on a plane or enjoying a staycation closer to home, taking your business away from your regular workplace brings about a new bevy of security risks. These include…

Read More

New GoFetch Vulnerability in Apple's M Chips Allows Secret Keys Leak on Compromised Computers

New GoFetch Vulnerability in Apple's M Chips Allows Secret Keys Leak on Compromised Computers

The newly exposed GoFetch vulnerability affecting Apple’s M1, M2 and M3 chips lets an attacker exfiltrate secret keys from cryptographic applications on a targeted system. The exploit works by running a fraudulent process on the same CPU cluster as the targeted process on the targeted machine. No easy mitigation currently exists for this vulnerability, as it resides in the hardware. What is the GoFetch vulnerability? GoFetch is a cache side-channel vulnerability. This type of vulnerability…

Read More