Asterisk Security Threats and Best Practices
December 28th, 2011
Attacks on Asterisk-based telephony systems are not uncommon. This video explains how to mitigate some attack vectors:
Attacks on Asterisk-based telephony systems are not uncommon. This video explains how to mitigate some attack vectors: