DblTek GSM gateways have a hidden backdoor password that allows root shell access. How can users protect themselves from this vulnerability?
According to IBM Managed Security Services data, cybercriminals most commonly target the SIP and SCCP protocols in VOIP spam attacks.
As Apple prepares to release iOS 10 and macOS Sierra on Sept. 7, mobile technology enthusiasts are eagerly anticipating many exciting new features.
Just like software or network defense, cybercriminals have found ways to circumvent and compromise SMS two-factor authentication.
The FTC is fighting back against annoying and criminal robocalls, which have been made possible thanks to the growth of voice-over-IP (VoIP) technology.
Security researchers recently discovered a possible vulnerability in voice-over-IP (VoIP) phones that could put users at risk.
Recent research from Google suggested that one of the most effective ways to curb cybercrime is to make it more expensive for criminals to carry out.
A remote-access Trojan available for sale on underground cyber crime forums attacks hotel PoS systems, stealing guests' payment information.