Researchers are saying that VoIP applications like Skype could be used for website attacks, and provide a way for malcreants to cover their tracks.
Unfortunately, they don’t actually say how this would all happen, preferring to describe a standard zombie/botnet network, and how criminals use them. And their suggestion to thwart this yet undetailed weakness – publish VoIP network routing specifications and/or switch to open standards. Hmm.
Give the criminals a map? Or are these researchers secretly working for the fine and dandy traditional US telco providers?
Leave a Reply