The IT Law Wiki
Advertisement

Definition[]

It is technically possible for an attacker to masquerade as another VoIP caller (VoIP spoofing). For example, an attacker could possibly inject a bogus caller ID into an ordinary VoIP call so that the receiver believes the call to be coming from a known and trusted source (i.e., a bank). The receiver, fooled by the electronic identification of the caller, may place unwarranted trust in the person at the other end. In such an exchange, the receiver may be tricked into disclosing personal information. Attackers may use these bits and pieces of personal information to complete partial identity records of victims of identity theft.

Advertisement