Certified: The CompTIA Security+ Audio Course
Episode 38: Image, File, and Voice-Based Threats (Domain 2)
15 Jun 2025
While emails and text messages are well-known vectors, attackers also exploit images, file attachments, and voice communication to bypass traditional security controls. In this episode, we explore steganography—embedding malicious code or data within image files—as well as the risks posed by file-based threats hidden in PDFs, Office documents, and ZIP archives that exploit unpatched applications or social engineering weaknesses. We also examine voice-based phishing, or vishing, where attackers impersonate trusted parties over the phone to trick targets into revealing sensitive information, transferring funds, or installing remote access tools. These methods often escape automated detection because they rely on human interaction or use file formats that appear harmless. Defending against them requires a combination of endpoint protection, application whitelisting, call-back verification policies, and strong user education. As attackers diversify their methods, defenders must account for all input channels—not just the obvious ones.
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
3ª PARTE | 17 DIC 2025 | EL PARTIDAZO DE COPE
01 Jan 1970
El Partidazo de COPE
Buchladen: Tipps für Weihnachten
20 Dec 2025
eat.READ.sleep. Bücher für dich
BOJ alza 25pb decennale sopra 2%, Oracle vola con accordo Tik Tok, 90 mld eurobond per Ucraina | Morning Finance
19 Dec 2025
Black Box - La scatola nera della finanza
365. The BEST advice for managing ADHD in your 20s ft. Chris Wang
19 Dec 2025
The Psychology of your 20s
LVST 19 de diciembre de 2025
19 Dec 2025
La Venganza Será Terrible (oficial)
Cuando la Ciencia Ficción Explicó el Mundo que Hoy Vivimos
19 Dec 2025
El Podcast de Marc Vidal