From the course: Introduction to Pen Testing for Cybersecurity Professionals

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Leaking data via email or VoIP

Leaking data via email or VoIP

- [Instructor] Data loss in a company occurs when users leak data, either maliciously or accidentally. Email can pose a threat, as malicious email can lead to a data breach. Voice over IP is also a concern as it represents data in motion, and a hacker can tap into the stream and listen to the conversation if not encrypted. As a result, the ethical hackers should test email and VoIP communications to ensure they do not provide a path for unintentional disclosure. So now, let's talk about email. Hackers use all types of ploys to introduce malicious activity into an organization. One way is email and can include spam, spoofing, phishing, or farming, and is another way to leak confidential data, either as an attachment or in the message. So, if we talk about some of the email threats, there are several. Spam is dangerous, as an email can contain a link that sends a recipient to a bogus website. If the victim clicks…

Contents