Certified: The CompTIA Security+ Audio Course
Episode 38: Image, File, and Voice-Based Threats (Domain 2)
15 Jun 2025
While emails and text messages are well-known vectors, attackers also exploit images, file attachments, and voice communication to bypass traditional security controls. In this episode, we explore steganography—embedding malicious code or data within image files—as well as the risks posed by file-based threats hidden in PDFs, Office documents, and ZIP archives that exploit unpatched applications or social engineering weaknesses. We also examine voice-based phishing, or vishing, where attackers impersonate trusted parties over the phone to trick targets into revealing sensitive information, transferring funds, or installing remote access tools. These methods often escape automated detection because they rely on human interaction or use file formats that appear harmless. Defending against them requires a combination of endpoint protection, application whitelisting, call-back verification policies, and strong user education. As attackers diversify their methods, defenders must account for all input channels—not just the obvious ones.
No persons identified in this episode.
This episode hasn't been transcribed yet
Help us prioritize this episode for transcription by upvoting it.
Popular episodes get transcribed faster
Other recent transcribed episodes
Transcribed and ready to explore now
3ª PARTE | 17 DIC 2025 | EL PARTIDAZO DE COPE
01 Jan 1970
El Partidazo de COPE
13:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
10:00H | 21 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
13:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana
12:00H | 20 DIC 2025 | Fin de Semana
01 Jan 1970
Fin de Semana