Discover how our products can revolutionize the way you communicate and collaborate.


Explore our advanced voice solutions designed to optimize your communication workflows.

Diverse range of DID number solutions designed to enhance your communication capabilities.

Experience unparalleled communication efficiency with our advanced SIP Trunking Solutions.

Cutting-edge technology to proactively detect and neutralize spam flags on your DID Numbers.


Wherever your audience is, our platform ensures seamless messaging across diverse channels.

Build customer journeys by fostering interactive conversations, all within the framework of your app. 

Connect with your audience in a simple and effective way through our cutting-edge SMS platform. 


Harness the power of IDT as your chosen carrier while leveraging your platform’s advanced features and services.

Integrate Twilio with our robust carrier routing platform to achieve unparalleled Voice termination system.

Experience reliable and high-quality communication services while leveraging the advanced capabilities of Genesys. 

Integrate IDT with the collaborative strength of MS Teams, unlocking efficient and feature-rich communication. 

Experience the power of our carrier network seamlessly connected to Plivo through our cutting-edge BYOC solution. 


Experience the power of our online voice tools, designed to simplify communication management. 

Ensure the authenticity and integrity of outbound calls with our STIR/SHAKEN Verification Check tool. 

User-friendly tool to verify the reputation of your business number, ensuring that it remains trusted. 

Compare and gain insights into outbound call expenses, optimize budget, and make informed decisions. 

Easily estimate and compare the costs associated with different DID numbers providers. 

Compare inbound VoIP rates among top CPaaS providers and optimize your inbound call costs. 

Generate custom SMS templates. 


Empower yourself with the resources you need to thrive in the dynamic landscape of communication.

Articles covering a wide range of topics.

Get answers to common queries.

Find instructions to make the most of our products.

Discover telecom insights and trends.

Find definitions of popular telecom terms.

Explore how our solutions have helped businesses.

Latest telecom trends, innovations, and market insights.


A global telecom partner built to meet your needs. 

Discover the story behind our commitment to delivering innovative solutions to connect people and businesses worldwide. 

Learn about our robust network infrastructure that spans across the globe, ensuring reliable and secure connectivity. 

Got a question, feedback, or need assistance? Our dedicated team is here to help!

Find partners or sign up for partnership programs.

Learn / Blog

Video Conferencing – The Next Hacking Target?

|  3 min
In this article

Video conferencing has been a key enabler for the growth in remote working. From a solitary work-at-homer to an enterprise with teams across the world, VC enables real face-to-face communication. But does it bring a new risk to the business?
We take VC facilities for granted, striving for better audio, quicker graphics and better team-working tools, but are we paying enough attention to security? Platforms such as FaceTime, WhatsApp and Skype make use of common technologies such as WebRTC, so what if a hacker could find and exploit a vulnerability? 

Here we take a brief look at research carried out recently into vulnerabilities and how a hacker might exploit them. Finally, we look at the best ways of protecting our VC calls. 

What’s the risk?

For business VC calls there is a significant potential risk in exposing sensitive information. This could be executives discussing financial information or technologists sharing IP details. Sensitive information is like a magnet for hackers. Outside of business, there is value in hacked data from individuals, such as their Facebook or WhatsApp accounts.
How could it be done? 

Natalie Silvanovich of Google’s Project Zero team recently uncovered vulnerabilities that could be exploited by a hacker (they have since been patched). Web Real-Time Communication (WebRTC) is a widely used open-source technology that enables real-time communication. Silvanovich found several vulnerabilities in WebRTC, serious enough to cause a crash with out of bounds or overflow errors. 

Hackers often initiate memory heap overflows as their break-in tool. By initiating an overflow on the target’s device, a hacker could take over their account and intercept the VC. There are two feasible methods:

  • The hacker initiates a VC call using a rogue device, establishes peer-to-peer communication and triggers the vulnerability on the target’s device
  • Using a phishing technique, the target is persuaded to initiate a VC, but using a signalling server that is under the hacker’s control. The hacker is then able to more easily establish a peer-to-peer communication with their rogue device. 

Will it affect wholesale VoIP termination rates?

We have seen a rise in telecoms fraud affecting operators’ revenues. Attacks such as Voice fraud, SMS fraud, and IPX fraud target both operators and the businesses using them. The example hacking methods we describe would affect businesses and consumers although we shouldn’t rule out escalation into targeting operators. 

How can we protect ourselves?

Silvanovich submitted the vulnerabilities as bugs, which were then fixed. So there is no immediate cause for alarm in the context of these specific cases. However, vigilance, as always, is vital to avoid bringing risk to business operations. Here are three suggestions for reducing risk:

  • Upgrade the VC tool to the latest security patch as soon as it becomes available. Developers are constantly fixing vulnerabilities and releasing them, so it’s critical to keep up to date
  • Train staff not to answer VC calls from unknown numbers. An incoming call is the natural entry point for a hacker
  • Use a firewall to protect VC communication

If you’re looking for a safe and secure video conferencing solution, try Huddle by Net2Phone. Huddle enables secure virtual face-to-face communications with people around the globe. 

Share this article

Leave a Reply

Your email address will not be published. Required fields are marked *


Meet our wholesale voice routing

Fulfill all your voice calling needs with our category leading wholesale A-Z Voice Termination.
Try IDT Express for a $25 Credit

Get $25 Free Trial Credit

Get IDT Express articles in your inbox

The best source of information in the telecom industry. Join us.

    Most Popular

    |  7 min
    Introduction to Toll-Free Forwarding In today’s fast-paced business landscape where...
    |  7 min
    Introduction to Caller ID Reputation Caller ID reputation is a...
    |  6 min
    The European Union’s General Data Protection Regulation (GDPR) has permanently...