Identity Theft

Identity theft - the stealing of passwords, user names, logons and any other identifying information and using it to steal money - is increasingly common. Identity theft is committed in many ways, from keystroke loggers to social engineering exploits. For instance, spam e-mails often ask people to visit a company Web site, which actually is a phony, and provide information. That information is then used to steal the victim's money. VoIP, which can easily be hidden and dismantled quickly, often is used in identity-theft scams.


Articles

FCC Close to Key Step on Connect America Fund

The Universal Service Fund (USF) - the complex set of rules by which rural telephone companies are subsidized - is on the point of great change.   In early October, the Federal Communications More >

All Signs Are Good for Videoconferencing

Even before the announced acquisition of Skype by Microsoft, videoconferencing was evolving at a rapid rate, driven by changes in the business structure and technology itself. Two recent studies More >

Careful Pre-Assessments Vital to Unified Communications Success

In "greenfield" builds, in which an organization deploys unified communications in a pristine environment, successful rollouts -- at least from the technical perspective -- are fairly More >

More Articles >

Interviews

Videoconferencing Options Depend on Organization Size

In most cases, the size of the organization, type of connection and  bandwidth considerations all play a part in the support of videoconferencing in the enterprise.

More >

Real-Time Phone Translation Gets Real

Carl Weinschenk spoke to Lexifone CEO and Chief Scientist Ike Sagie. This week, Lexifone and international telephone number provider Voxbone announced a partnership that will utilize Lexifone's real-time translation capabilities.

More >

The PBX Market Recovers, but Slowly

Carl Weinschenk spoke to Diane Myers, the directing analyst for VoIP and IMS at Infonetics Research. Last week, Infonetics released research entitled, "Enterprise Unified Communication, VoIP, and TDM More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

Five Tips to Build a Brand in 2015

Security Staffing

In the coming year, the technological connectedness of everyone on Earth will reach a level never before experienced by humanity. The old rules don't apply in this world. New rules must be developed.

 More >

Software Lets You Spin Private-Cloud Big Data Clusters

The Battle over Law Enforcement and Cell Data

The SDDC: Still a Work in Progress

Nimble Storage Connects Hybrid Array to Fibre Channel

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

'VoIP Performance Management and Optimization' Excerpt 'VoIP Performance Management and Optimization' Excerpt

Your infrastructure can have a dramatic impact on the quality of service for VoIP apps....

Voice over IP Security Excerpt Voice over IP Security Excerpt

This book chapter walks you through some key concerns and solution with the IP telephony solution....

VoIP for Dummies Excerpt VoIP for Dummies Excerpt

In addition to hardware and software, you will need to anticipate specific support costs for your VoIP implementation....

Understanding Voice over Internet Protocol (VoIP) Understanding Voice over Internet Protocol (VoIP)

Implementing VoIP require you to evaluate numerous issues, including security and infrastructure....

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Thanks for your registration, follow us on our social networks to keep up-to-date