Blog | G5 Cyber Security

Steganography Meets VoIP in Hacker World

Researchers and hackers are developing tools to execute a new data-leak threat: sneaking proprietary information out of networks by hiding it within VoIP traffic. Techniques that fall under the category of VoIP steganography have been discussed in academic circles for a few years. There are more than 1,000 programs available for download online that can place secret data within image, sound and text files. The best way to combat the threat is to look for the telltale signs – known programs on computers.”]

Source: https://www.csoonline.com/article/2124330/steganography-meets-voip-in-hacker-world.html

Exit mobile version