TheTechGuide Forum
General Category => News => Topic started by: Josetann on August 02, 2006, 11:22:00 PM
-
Attackers could use the tools to disconnect calls, reassign extensions or flood VoIP systems with bogus calls.
Click here (http://\"http://news.zdnet.com/2100-1009_22-6101610.html\") to read the full article.