Why do cybercriminals choose VoIP phishing as their mode of deception? VoIP Why do cybercriminals choose VoIP phishing as their mode of deception?