Cisco stomped out a critical vulnerability in its IP Phone web server that could enable remote code execution by an unauthenticated attacker. Cisco is warning of a critical flaw in the web server of ...
The most serious vulnerabilities in Cisco’s 8800 Series IP Phones could allow unauthenticated, remote attackers to conduct a cross-site request forgery attack or write arbitrary files to the ...
Cisco has disclosed today a high-severity zero-day vulnerability affecting the latest generation of its IP phones and exposing them to remote code execution and denial of service (DoS) attacks. The ...
Office phones have come a long way in a relatively short time. With the introduction of Internet Protocol phones, new features make those devices more akin to computers than simple phone systems.
This blog will be a break from the H.323 blog series I’m currently doing to discuss EoS and EoL information related to Cisco phones. One of my students has recently told me that Cisco would not sell ...
I manage a small office network (around 10 computers) for a client of mine, and they decided to get a new phone system without realizing it was an IP system. It is a Cisco IP phone system. Previously ...
I've got a problem, I've been trying to implement some layer2 security on our switches with Port-Security, only allowing 2 MAC addresses on any 1 switchport. I've been looking at some of our switches ...
This lesson introduces and describes the role, architecture, hardware and software requirements, and the licensing model of the CUCM. Cisco Unified Communications (UC) is an IP-based communications ...
John Breeden II is an award-winning reviewer with more than 20 years of experience covering technology. Follow him on Twitter @TheLabGuys. Office phones have come a long way in a relatively short time ...