I thought it would be a good time to post MY OWN list of what see as the 8 most common UC threats (I even provided a chart).
Here is a discussion of a recent voice phishing or vishing attack against hotel guests. It is really more of a social engineering attack, but thats ok. Apparently someone calls into hotels late at night, poses as a hotel employee, and tries to trick guests into disclosing personal information, including name, credit card info, etc.
It doesn't seem like a very effective attack - most guests would be furious that they were woken up.
Check out our webinar on threats to contact centers.
Here is a recent article on voice, VoIP, UC security. 50 recommendations.
It must be in the water. Here is a link to another social engineering attack.
Defcon held a social engineering contest at the last Blackhat/Defcon conference. Participants had 20 minutes to show how they could call in and social engineer their way into a target. Here is an article about the contest and one contestant who social engineered their way into Walmart and Target stores.
The bottom line is that social engineering is live and well. Advances with data network security, as well as the abiity to gather intelligence on a target via the Internet (google, Facebook, on and on), spoofing caller ID (which they didn't even do in the contest), make social engineering a very efficient hacking technique.
Note that I added a list for social engineering.
Here is an article about how an attacker changed the address on one of billionaire Paul Allens accounts, to trick the bank into sending the attacker a debit card.
Here is an interesting article on contact center fraud.