The latest techniques for averting UC disasterEstablish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today s rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.See how hackers target vulnerable UC devices and entire networksDefend against TDoS, toll fraud, and service abuseBlock calling number hacks and calling number spoofingThwart voice social engineering and phishing exploitsEmploy voice spam mitigation products and filtersFortify Cisco Unified Communications ManagerUse encryption to prevent eavesdropping and MITM attacksAvoid injection of malicious audio, video, and media filesUse fuzzers to test and buttress your VoIP applicationsLearn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC