Sipera Viper Lab IDs ThreatsSipera Viper Lab IDs Threats
Sipera Viper Lab disclosed nine threat advisories for WiFi/dual mode telephones from vendors including RIM, HTC, Samsung, Dell, and D-Link

RICHARDSON, Texas -- Sipera VIPER Lab, operated by Sipera Systems, the leader in pure security for VoIP, mobile and multimedia communications, today disclosed nine threat advisories for WiFi/dual mode telephones from vendors including RIM, HTC, Samsung, Dell and D-Link. These threat advisories are in addition to the new SIP vulnerabilities published by Sipera VIPER Lab.
Sipera proactively identifies VoIP threats through its Sipera VIPER Lab, which is comprised of experienced VoIP application developers, architects, and engineers, operating 24/7/365 from Richardson, Texas, and Hyderabad, India. Every day, the dedicated VIPER Lab researchers identify new vulnerabilities and potential exploits in VoIP protocols, VoIP equipment and phones. They also scan web sites, blogs, discussion groups, and media outlets for evidence of known, suspected and new VoIP vulnerabilities and attacks.
These vulnerabilities are posted at http://www.sipera.com/viper as a service to Sipera’s customers and the general public. Sipera VIPER Lab follows a disclosure policy which notifies equipment vendors, in advance, of the potential vulnerabilities and works with each of these vendors to publish a response/fix or identify other solutions to these security issues.
“VoIP security is just beginning to get more attention now that VoIP adoption has reached a tipping point in the last year. It is refreshing to see Sipera’s launch of VIPER Lab that will assuredly help promote and advance the state of VoIP security research and help raise the overall awareness of VoIP threats and corresponding best practices,” said David Endler, chairman of the Voice over IP Security Alliance (VOIPSA), an industry consortium created to drive adoption of VoIP by promoting the current state of VoIP security research, VoIP security education and awareness, and free VoIP testing methodologies and tools.
About the Author
You May Also Like
Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025Shift Left: Integrating Security into the Software Development Lifecycle
Mar 5, 2025