VoIP Business and Virtual PBX
VoIP buster

RSA weak keys flaw restricted to network devices

However these weak keys were almost in every way restricted to embedded devices: "firewalls, routers, VPN devices, remote server administration devices, printers, projectors, and VoIP (Voice over Internet Protocol) phones" from over 30 manufacturers.

"Cryptographic algorithms are nearly never the root cause of security problems - for the moment those that are not 'in the basement' proprietary algorithms," said Terence Spies, CTO of Voltage Security. "Correct implementation of any security innovation is crucial, and has proven to be quite difficult."

Based on candid 'warts and all' feedback from over a thousand experienced adopters, we take a practical look at the use of desktop Linux in a real world business context.

More information: Theregister.co