| ||
As VoIP is rolled out rapidly to enterprise networks over the next few years , the accessibility and sexiness of fuzzing VoIP technology will increase. The amount of security research and bughunting around VoIP products has only reached the tip of the iceberg, and we predict many more vulnerabilities will begin to emerge.