CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

Vishing scams on the rise: How to protect yourself

admin by admin
June 23, 2022
in Information Security
Share on FacebookShare on Twitter


If you don’t think you should trust someone or a link you received, trust your instinct. It’s far better to be safe than a victim of a vishing scam.

Vishing scams have quickly become another major security threat for people around the globe. And although Interpol has cracked down in recent days, the risk of being targeted — and falling victim — to vishing scams has reached new heights.

Interpol announced last week that it had conducted raids over the past two months across 76 countries as part of its Operation First Light 2022. The effort, which spanned more than 1,700 locations and identified 3,000 suspects, aimed at targeting fraudsters who engaged in a variety of social engineering and human trafficking activities, including money mule herding and sexual slavery operations. The crackdown focused on criminals who use social media and other technologies as their main mode for finding and exploiting victims.

All told, Interpol was able to freeze 4,000 bank accounts, intercept $50 million in illicit funds, and arrest 2,000 people across the globe.

Human trafficking and money laundering have long been a core Interpol focus. And while law enforcement agencies have warned about vishing scams for years, Interpol acknowledged in a statement last week that it’s become an increasingly concerning problem in the broader area of cybercrime.

What is vishing?

Vishing is short for voice phishing or voicemail phishing. In either case, the criminal uses voice communication (or the promise of voice communication) to target individuals and coerce them into sharing sensitive information about themselves.

Vishing scams have become an especially prominent problem among those who are less digitally inclined and may be more likely and willing to hand over information over the phone.


Further reading:
Tech support scams targeting seniors on the rise
How to protect your older loved ones from getting scammed online


How do I fall victim to vishing scams?

Vishing scams can come in many forms, but they generally involve two vectors that both aim at getting you to hand over your information.

The first method, voice phishing, aims at getting you on the phone. In some cases, fraudsters will pose as bank officials or those from a government entity like the Internal Revenue Service. They may even say they’re from a cybersecurity company. Depending on the angle they take, the fraudsters will seek to dupe you into believing that your personal information is at risk, has been stolen, or you simply owe money for something. They’ll then send you a link to a fraudulent site that will be used to steal sensitive information and credentials to bank accounts, email accounts, or any other data they’re targeting.

Voicemail phishing scams are designed for those who use services like WhatsApp for their voice messaging. They may also be used against corporate users who receive emails when voicemails are left on their work phones.

While the emails or messages from the fraudsters will look legitimate and appear to come from a real voicemail service, they’re not. Instead, when you click on the link in the email to listen to your voice message, you’ll find a malicious page that aims at stealing your information.

How can I protect myself from vishing scams?

Vishing scammers are effective at what they do, so it’s important not to underestimate them. But there are some steps you can take to protect yourself.

For one, don’t ever share personal information with anyone over the phone without verifying that they are indeed from the organization they claim to be. Instead of talking to the person who calls you, instead call the organization itself by using their official numbers listed on their website.

Whenever you receive an email purporting to include a voicemail, take a second to evaluate whether it’s legitimate. While it may look like a real email, inspect the link it wants you to visit and check to see whether it came from the domain you’d expect. In some cases, vishing scammers will use domains and links that look similar to the desired destination but not identical.

Finally and perhaps most importantly, if something just doesn’t feel right, don’t trust it. With all the scams we face each day, it’s easy to fall prey. But if something feels off or you just don’t think you should trust the person or link you just received, trust your instinct. It’s far better to be safe than a victim of a vishing scam.



Source link

Previous Post

“Make It Meaningful”: CIOs Discuss Keys to Leading Hybrid IT Teams

Next Post

AWS re:Inforce 2022: Threat detection and incident response track preview

Related Posts

Information Security

Learn NIST Inside Out With 21 Hours of Training @ 86% OFF

by admin
June 25, 2022
Information Security

The secret gay history of the modern internet

by admin
June 25, 2022
Information Security

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

by admin
June 24, 2022
Information Security

ToddyCat claws at Asian governments

by admin
June 24, 2022
Information Security

NSO Confirms Pegasus Spyware Used by at least 5 European Countries

by admin
June 23, 2022
Next Post

AWS re:Inforce 2022: Threat detection and incident response track preview

Leave Comment

Recommended

Q&A with CIO Dustin Hufford, Part 1: Adopting an Agile Mindset & Flipping IT Governance

June 26, 2022

Inspirationalleadership ~ Future of CIO

June 26, 2022

Learn NIST Inside Out With 21 Hours of Training @ 86% OFF

June 25, 2022

The secret gay history of the modern internet

June 25, 2022

“We Need to Get Better”: How CIOs Are Working to Extract More Value from EHRs

June 25, 2022

Innerframeworkforblance

June 25, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.