Vulnerabilities in Data Transfer