Feb. 23, 2022, 2:21 a.m. | Giampaolo Bella, Pietro Biondi, Stefano Bognanni

cs.CR updates on arXiv.org arxiv.org

Printing over a network and calling over VoIP technology are routine at
present. This article investigates to what extent these services can be
attacked using freeware in the real world if they are not configured securely.
In finding out that attacks of high impact, termed the Printjack and Phonejack
families, could be mounted at least from insiders, the article also observes
that secure configurations do not appear to be widely adopted.


Users with the necessary skills may put existing security …

network phones printers voip

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

IT Security Manager

@ Teltonika | Vilnius/Kaunas, VL, LT

Security Officer - Part Time - Harrah's Gulf Coast

@ Caesars Entertainment | Biloxi, MS, United States

DevSecOps Full-stack Developer

@ Peraton | Fort Gordon, GA, United States

Cybersecurity Cooperation Lead

@ Peraton | Stuttgart, AE, United States

Cybersecurity Engineer - Malware & Forensics

@ ManTech | 201DU - Customer Site,Herndon, VA