Computer Hacking/Cracking has traditionally been viewed as a methodology for gaining access to equipment and information. But what about when it's used as access to resources worth millions of dollars?
VoIP is increasingly becoming the de-facto methodology for both private and business communication around the globe. With the migration to VoIP we expose all the vulnerabilities of the traditional telephony system without any of the protections afforded by dedicated circuits and copper lines. This talk focuses on the current state of VoIP hacking and Fraud worldwide and discusses some of the more common methodologies utilised in exploiting VoIP vulnerabilities.