{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/vishing","result":{"data":{"contentfulDictionaryTerm":{"title":"Vishing","slug":"vishing","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":" Learn about the vishing scam, how it works, and how to protect yourself from becoming a victim."}},"body":{"body":"# Voice Phishing Explained (Vishing)\nScammers have taken fraud to the next level. And it is not a surprise if you’re a recent victim of a __vishing attack__. Cybercriminals are utilising dark web tech savvy skills to steal money, and identity. Aside from the__ COVID-19 scam__ among other scamming tricks—they’re now posing as Social Security to fool us to reimburse money through Bizam.\n\n__What is Bizum?__ This is a trending scam tactic that __Internet User Security__ has warned about. It depicts Social Security and asks for some contribution to __Bizam__. To succeed in this fraud, the __vishing__ scheme is executed. Vishing is more like an equivalent of the phishing scam technique—only it’s done on calls.\n\nUsually, the scammer will use social engineering techniques to bypass __mobile security__ and deceive you through phone calls. They’ll often pretend to be, say, a company like Social Security, or a technical worker looking to help solve a suspicious technical problem. \n\nUnder this situation, the criminal tends to convince you to share your valuable details. For instance, they would trick you to confirm some info like your email address, or social security number.\n\n## What is Vishing?\nAlso known as __voice phishing__—vishing is simply the use of telephony—usually __Voice over IP__ (VoIP) telephony—to conduct __phishing__ frauds. Vishing criminals are repeatedly using modern VoIP features like __automated systems__ (IVR), and __caller ID spoofing__ to delay detection by law enforcement agencies. \n\nVoice phishing is usually used to steal your credit card details, or other valuable info that is often used in __identity theft__ schemes. Although sometimes criminals would use live callers—they often prefer voice phishing scams which are conducted through __automated text-to-speech__ systems. The goal is to direct, or convince you to dial a number that is obviously controlled by the scammer.\n\n## Types of Vishing or Voice Phishing\n1. __Voice over IP (VoIP)__. VoIP is a web-based phone system that makes vishing much easier by allowing for multiple technologies to run in pairs. To make a spam call, the scammers uses VoIP-connected servers.\n\n2. __Caller ID spoofing__. This is when a phone network is altered to show a fake number on your caller ID. Various companies have certain programs, or devices that allow __caller ID spoofing__.\n\nSuch programs, or devices can be used to fill a caller ID with a specific Bank name, or credit union. Sometimes you can just write __Credit Union__, or __Bank__, and that’s what is shown as the caller ID.\n\n3. __Dumpster diving__. Just as it sounds, Dumpster diving involves a criminal digging for the valuable info on a bank’s dumpster to get a list of mobile numbers. With this info at hand, the scammer can program the numbers into their system, and plan for a special spam call attack.\n\n4. __War dialling__. Scammers are often using automated systems with special messages concerning banks, or credit unions to call different area codes. If, say, you get hooked on a spam call, a recorded voice message will start asking for your credit card, or bank account details.\n\n## Common Methods of Vishing Scams\nCybercriminals will often use social engineering schemes to convince you to pay some money, or give away your sensitive info. Usually, a thief will attempt to create a sense of urgency, or impose fear of some sort of authority to leverage against you. Here are some __common methods of Vishing__.\n\n1. Imposter Scammers: Some criminals will pretend to be an important person, or a company that is relative to you. They then use your relationship with this __important person__, or __company__ to leverage and commit fraud. Here are some examples of Imposter scams you should watch for.\n\n- __Tech Support Fraud__. Here, the fraudster pretends to be the __tech support__ and claims there’s a technical issue on your device that needs special attention. The criminal will always employ a sense of urgency to gain control over your device, remotely.\n\n- They do this by sending an email with a link that prompts you to run some program that’s intended to diagnose the supposed problem, only it instals spyware in your system.\n\n- __IRS Scam__. Here, the fraudster calls and pretends to be an ISR immigration officer, and threatens an arrest, or deportation if, say, you don’t pay off their __debts__; even if this debt thing isn’t certainly a real case.\n\n- __Romance Fraud__. The scammer here pretends to be a potential love interest via some online dating application to create curiosity, and trigger a trapping conversation. Sometimes, they may pose as your __EX fiance__, and ask for emergency funding of some sort.\n\n2. __Investment Fraud__: This kind of scam involves a criminal who’s pretending to be some kind of financial expert to trick you into offering some bucks for an investment.\n\n3. __Credit Repair and Debt Relief Fraud__. A potential thief may also pose as an organisation, and claim to relieve you from some debt, or repair your credit score. The hacker then requests a company service fee. This is how a thief steals your money if, say, you get a little careless.\n\n4. __Charity Fraud__. This happens when a cybercriminal poses as a member of some charity organisation to convince you to donate money to their cause. Usually, the fake organisation doesn’t do any charity work. Instead, the donated money only goes straight to the thief’s pocket.\n\n5. __Parcel Scam__. In most cases, parcel scams often target the immigration community. A scammer claims that you have a parcel that needs to be picked up. Generally, they would pretend to be some courier company. Once you’re hooked on the game—things get more interesting. Let me explain.\n\nThe nonexistence package now seems to be linked to another nonexistent financial criminal case. So, the criminal who’s pretending to be a courier company forwards the matter to another criminal who’s now posing as a police officer of the subjected foreign country.\n\nMoreover, the fake officer then explains how you’re a suspect of fake money laundering activity, and, therefore, you need to be investigated. You get sucked into the fraud, even more, when the officer convinces you that you might only be a victim of __identity theft__.\n\nFurther, the first criminal now convinces you to send some fee to the fake police to investigate the matter. And throughout the process, the criminal takes some extra caution to convince you that they’re not scammers by reiterating that the police won’t ask for your personal, or bank details.\n\n6. __Auto Warranty Fraud__. If you’re targeted for this scam—the criminal will likely call you regarding your vehicle’s warranty, and provide an option for renewing it online. \n\nSuch offers tend to be legit if, say, the scammer has info about your car. They’re always hoping that this trick will lure you into sharing your personal details, or buy the __fake auto warranty renewal__.\n\n7. __Kidnapping Fraud__. This one here will often scare someone and pull the emotions out of them. Normally, someone would call and tell you that they have kidnapped your child, or a close relative then demand a ransom payment.\n\nCriminals who do this appear to have either conducted thorough research beforehand, or they’re applying *social engineering* techniques and assumptions, to glean information about your close relatives from you. Although this scam can target anyone—the elderly are almost often the targets.\n\nBecause scammers think that an elderly person is more vulnerable to fraud compared to the average man. They assume that these people have children, or grandchildren somewhere. And they’ll even threaten to harm them if, say, the victim hangs up the call.\n\nSometimes scammers may let their victim speak to their supposed abducted relative—and thanks to the confusion, fear and phone effects on someone’s voice—the victim may not notice the difference, and may only think that their kin has surely been kidnapped. \n\n### How to Detect Vishing\nA straightforward technique for detecting vishing is to make use of __blacklists__. Recent studies have attempted to create accurate differences between legit, and vishing scams by applying data analysis, and artificial intelligence (AI).\n\nBy analysing and converting voice calls to text messages, AI mechanisms like natural language processing can be used to detect vishing frauds. \n\n### How to Protect Yourself From Vishing Attacks?\nHere’s the short version of how you can avoid being a victim of phone scams.\n\n- Avoid responding to unknown numbers\n- Avoid sharing your personal details, especially on the phone.\n- Don’t trust caller ID 100%\n- Don’t call the numbers that are given by unknown callers, or those displayed on caller ID.\n\nHere’s a more detailed version of how you can protect yourself from vishing attacks.\n\n1. Financial institutions like banks don’t call or text their clients and ask for information like passwords. Such attempts are common scamming tactics used to steal the dollar, or your identity.\n\n2. Don’t show your identity proof to a stranger or anyone without a genuine reason.\n\n3. Never click on links to access your bank’s site. In most cases, chances are, it’s a phishing site that wants to redirect you to their impersonating site to capture your banking details. Always only access your bank’s website by typing your bank’s genuine URL in your browser’s address bar.\n\n4. Avoid responding to calls or voicemail messages that prompt you to verify or update your User ID, credit card details, or passwords. Notify your bank of such attempts. In the event, you accidentally revealed your personal info, change your password immediately.\n\n5. Always keep in mind that sensitive information such as passwords or PINs, for example, are strictly only for you. This info can’t be revealed even to bank personnel or the directors themselves.\n\n### Use Guardio to Protect Yourself from Vishing Scams\n[Guardio](https://guard.io/plans \"Guardio Plans page\") offers powerful protection against phishing scams, including vishing, and smishing by providing real-time alerts and safety checks. It monitors for suspicious activity and blocks malicious sites and links, effectively preventing you from being redirected to fake websites designed to steal your information. With [Guardio](https://guard.io/plans \"Guardio Plans page\"), you can browse with confidence, knowing that it's actively safeguarding your personal details from scammers looking to exploit them.\n\n### Frequently Asked Questions (FAQs)\n1. __What is a Vishing Attack?__\nVoice phishing or vishing is the act of instilling fear or causing panic to a victim through a spam call. This may include a solution to a fake problem, or some fake offers like a discounted auto warranty renewal.\n\nThe goal of vishing is to attain sensitive info that only results in direct compromise of the victim. Also, hackers may __fake__, or __spoof__ their mobile numbers to add authenticity to a scam. Sometimes they can use voice changers to hide their identity. \n\n2. __What Does Vishing Mean?__\nVishing is a modern-day cybercrime that involves telephony (VoIP) to commit phishing scams like stealing someone’s valuable info as a result of identity theft. Criminals often employ social engineering techniques to convince you to share this information. \n\n3. __What is the Difference Between Phishing and Vishing?__\n__Phishing__ is a type of social engineering where a hacker sends a spam text or email to trick you into giving up your personal details, or perform an action—in this sense, running a program—like installing a malicious program into your system to compromise your __mobile security__. Phishing often involves emails, and messaging platforms.\n\nMeanwhile, Vishing is the use of VoIP technology to commit cyberattacks through automated recordings, or real calls. Both scam methods have a common goal except one uses messaging platforms and the other uses phone calls. \n\n4. __What is Vishing in Cyber Crime?__\n__Vishing in cybercrime__ is the act of making a fraudulent call, or a spam call to unsuspecting persons, in most cases, elderly people. \n\nFurther, the spammer tends to deliver fearsome messages to cause panic and hope that the victim will fall into their trap, and give up their essential information. This could be their social security details, or bank details. Sometimes they can ask you to buy fake offers.\n\n5. __What is Vishing in Cyber Crime?__\n__Vishing in cybercrime__ is the act of making a fraudulent call, or a spam call to unsuspecting persons, in most cases, elderly people. \n\nFurther, the spammer tends to deliver fearsome messages to cause panic and hope that the victim will fall into their trap, and give up their essential information. This could be their social security details, or bank details. Sometimes they can ask you to buy fake offers.\n\n### Final Thoughts\nAn effective mitigation strategy is to teach, or train the general public to acknowledge the traits of vishing frauds as well as how to detect phishing messages. \n\nA more technical approach, however, is to utilise a software detection tool to enhance [mobile security](https://guard.io/plans \"Guardio Plans page\"). Usually, such mechanisms can distinguish between spam calls, and legit calls, or texts. Also, they can be more cheaply implemented compared to public training. \n","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"voice-phishing-explained-vishing","style":"position:relative;"},"children":[{"type":"text","value":"Voice Phishing Explained (Vishing)"},{"type":"element","tagName":"a","properties":{"href":"#voice-phishing-explained-vishing","ariaLabel":"voice phishing explained vishing permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Scammers have taken fraud to the next level. And it is not a surprise if you’re a recent victim of a "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"vishing attack"}]},{"type":"text","value":". Cybercriminals are utilising dark web tech savvy skills to steal money, and identity. Aside from the__ COVID-19 scam__ among other scamming tricks—they’re now posing as Social Security to fool us to reimburse money through Bizam."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"What is Bizum?"}]},{"type":"text","value":" This is a trending scam tactic that "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Internet User Security"}]},{"type":"text","value":" has warned about. It depicts Social Security and asks for some contribution to "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Bizam"}]},{"type":"text","value":". To succeed in this fraud, the "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"vishing"}]},{"type":"text","value":" scheme is executed. Vishing is more like an equivalent of the phishing scam technique—only it’s done on calls."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Usually, the scammer will use social engineering techniques to bypass "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"mobile security"}]},{"type":"text","value":" and deceive you through phone calls. They’ll often pretend to be, say, a company like Social Security, or a technical worker looking to help solve a suspicious technical problem."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Under this situation, the criminal tends to convince you to share your valuable details. For instance, they would trick you to confirm some info like your email address, or social security number."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"what-is-vishing","style":"position:relative;"},"children":[{"type":"text","value":"What is Vishing?"},{"type":"element","tagName":"a","properties":{"href":"#what-is-vishing","ariaLabel":"what is vishing permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Also known as "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"voice phishing"}]},{"type":"text","value":"—vishing is simply the use of telephony—usually "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Voice over IP"}]},{"type":"text","value":" (VoIP) telephony—to conduct "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"phishing"}]},{"type":"text","value":" frauds. Vishing criminals are repeatedly using modern VoIP features like "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"automated systems"}]},{"type":"text","value":" (IVR), and "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"caller ID spoofing"}]},{"type":"text","value":" to delay detection by law enforcement agencies."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Voice phishing is usually used to steal your credit card details, or other valuable info that is often used in "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"identity theft"}]},{"type":"text","value":" schemes. Although sometimes criminals would use live callers—they often prefer voice phishing scams which are conducted through "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"automated text-to-speech"}]},{"type":"text","value":" systems. The goal is to direct, or convince you to dial a number that is obviously controlled by the scammer."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"types-of-vishing-or-voice-phishing","style":"position:relative;"},"children":[{"type":"text","value":"Types of Vishing or Voice Phishing"},{"type":"element","tagName":"a","properties":{"href":"#types-of-vishing-or-voice-phishing","ariaLabel":"types of vishing or voice phishing permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ol","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Voice over IP (VoIP)"}]},{"type":"text","value":". VoIP is a web-based phone system that makes vishing much easier by allowing for multiple technologies to run in pairs. To make a spam call, the scammers uses VoIP-connected servers."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Caller ID spoofing"}]},{"type":"text","value":". This is when a phone network is altered to show a fake number on your caller ID. Various companies have certain programs, or devices that allow "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"caller ID spoofing"}]},{"type":"text","value":"."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Such programs, or devices can be used to fill a caller ID with a specific Bank name, or credit union. Sometimes you can just write "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Credit Union"}]},{"type":"text","value":", or "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Bank"}]},{"type":"text","value":", and that’s what is shown as the caller ID."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ol","properties":{"start":3},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Dumpster diving"}]},{"type":"text","value":". Just as it sounds, Dumpster diving involves a criminal digging for the valuable info on a bank’s dumpster to get a list of mobile numbers. With this info at hand, the scammer can program the numbers into their system, and plan for a special spam call attack."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"War dialling"}]},{"type":"text","value":". Scammers are often using automated systems with special messages concerning banks, or credit unions to call different area codes. If, say, you get hooked on a spam call, a recorded voice message will start asking for your credit card, or bank account details."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h2","properties":{"id":"common-methods-of-vishing-scams","style":"position:relative;"},"children":[{"type":"text","value":"Common Methods of Vishing Scams"},{"type":"element","tagName":"a","properties":{"href":"#common-methods-of-vishing-scams","ariaLabel":"common methods of vishing scams permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Cybercriminals will often use social engineering schemes to convince you to pay some money, or give away your sensitive info. Usually, a thief will attempt to create a sense of urgency, or impose fear of some sort of authority to leverage against you. Here are some "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"common methods of Vishing"}]},{"type":"text","value":"."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ol","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Imposter Scammers: Some criminals will pretend to be an important person, or a company that is relative to you. They then use your relationship with this "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"important person"}]},{"type":"text","value":", or "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"company"}]},{"type":"text","value":" to leverage and commit fraud. Here are some examples of Imposter scams you should watch for."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Tech Support Fraud"}]},{"type":"text","value":". Here, the fraudster pretends to be the "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"tech support"}]},{"type":"text","value":" and claims there’s a technical issue on your device that needs special attention. The criminal will always employ a sense of urgency to gain control over your device, remotely."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"They do this by sending an email with a link that prompts you to run some program that’s intended to diagnose the supposed problem, only it instals spyware in your system."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"IRS Scam"}]},{"type":"text","value":". Here, the fraudster calls and pretends to be an ISR immigration officer, and threatens an arrest, or deportation if, say, you don’t pay off their "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"debts"}]},{"type":"text","value":"; even if this debt thing isn’t certainly a real case."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Romance Fraud"}]},{"type":"text","value":". The scammer here pretends to be a potential love interest via some online dating application to create curiosity, and trigger a trapping conversation. Sometimes, they may pose as your "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"EX fiance"}]},{"type":"text","value":", and ask for emergency funding of some sort."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ol","properties":{"start":2},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Investment Fraud"}]},{"type":"text","value":": This kind of scam involves a criminal who’s pretending to be some kind of financial expert to trick you into offering some bucks for an investment."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Credit Repair and Debt Relief Fraud"}]},{"type":"text","value":". A potential thief may also pose as an organisation, and claim to relieve you from some debt, or repair your credit score. The hacker then requests a company service fee. This is how a thief steals your money if, say, you get a little careless."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Charity Fraud"}]},{"type":"text","value":". This happens when a cybercriminal poses as a member of some charity organisation to convince you to donate money to their cause. Usually, the fake organisation doesn’t do any charity work. Instead, the donated money only goes straight to the thief’s pocket."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Parcel Scam"}]},{"type":"text","value":". In most cases, parcel scams often target the immigration community. A scammer claims that you have a parcel that needs to be picked up. Generally, they would pretend to be some courier company. Once you’re hooked on the game—things get more interesting. Let me explain."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"The nonexistence package now seems to be linked to another nonexistent financial criminal case. So, the criminal who’s pretending to be a courier company forwards the matter to another criminal who’s now posing as a police officer of the subjected foreign country."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Moreover, the fake officer then explains how you’re a suspect of fake money laundering activity, and, therefore, you need to be investigated. You get sucked into the fraud, even more, when the officer convinces you that you might only be a victim of "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"identity theft"}]},{"type":"text","value":"."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Further, the first criminal now convinces you to send some fee to the fake police to investigate the matter. And throughout the process, the criminal takes some extra caution to convince you that they’re not scammers by reiterating that the police won’t ask for your personal, or bank details."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ol","properties":{"start":6},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Auto Warranty Fraud"}]},{"type":"text","value":". If you’re targeted for this scam—the criminal will likely call you regarding your vehicle’s warranty, and provide an option for renewing it online."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Such offers tend to be legit if, say, the scammer has info about your car. They’re always hoping that this trick will lure you into sharing your personal details, or buy the "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"fake auto warranty renewal"}]},{"type":"text","value":"."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ol","properties":{"start":7},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Kidnapping Fraud"}]},{"type":"text","value":". This one here will often scare someone and pull the emotions out of them. Normally, someone would call and tell you that they have kidnapped your child, or a close relative then demand a ransom payment."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Criminals who do this appear to have either conducted thorough research beforehand, or they’re applying "},{"type":"element","tagName":"em","properties":{},"children":[{"type":"text","value":"social engineering"}]},{"type":"text","value":" techniques and assumptions, to glean information about your close relatives from you. Although this scam can target anyone—the elderly are almost often the targets."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Because scammers think that an elderly person is more vulnerable to fraud compared to the average man. They assume that these people have children, or grandchildren somewhere. And they’ll even threaten to harm them if, say, the victim hangs up the call."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Sometimes scammers may let their victim speak to their supposed abducted relative—and thanks to the confusion, fear and phone effects on someone’s voice—the victim may not notice the difference, and may only think that their kin has surely been kidnapped."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"how-to-detect-vishing","style":"position:relative;"},"children":[{"type":"text","value":"How to Detect Vishing"},{"type":"element","tagName":"a","properties":{"href":"#how-to-detect-vishing","ariaLabel":"how to detect vishing permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"A straightforward technique for detecting vishing is to make use of "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"blacklists"}]},{"type":"text","value":". Recent studies have attempted to create accurate differences between legit, and vishing scams by applying data analysis, and artificial intelligence (AI)."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"By analysing and converting voice calls to text messages, AI mechanisms like natural language processing can be used to detect vishing frauds."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"how-to-protect-yourself-from-vishing-attacks","style":"position:relative;"},"children":[{"type":"text","value":"How to Protect Yourself From Vishing Attacks?"},{"type":"element","tagName":"a","properties":{"href":"#how-to-protect-yourself-from-vishing-attacks","ariaLabel":"how to protect yourself from vishing attacks permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Here’s the short version of how you can avoid being a victim of phone scams."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Avoid responding to unknown numbers"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Avoid sharing your personal details, especially on the phone."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Don’t trust caller ID 100%"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"Don’t call the numbers that are given by unknown callers, or those displayed on caller ID."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Here’s a more detailed version of how you can protect yourself from vishing attacks."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ol","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Financial institutions like banks don’t call or text their clients and ask for information like passwords. Such attempts are common scamming tactics used to steal the dollar, or your identity."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Don’t show your identity proof to a stranger or anyone without a genuine reason."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Never click on links to access your bank’s site. In most cases, chances are, it’s a phishing site that wants to redirect you to their impersonating site to capture your banking details. Always only access your bank’s website by typing your bank’s genuine URL in your browser’s address bar."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Avoid responding to calls or voicemail messages that prompt you to verify or update your User ID, credit card details, or passwords. Notify your bank of such attempts. In the event, you accidentally revealed your personal info, change your password immediately."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Always keep in mind that sensitive information such as passwords or PINs, for example, are strictly only for you. This info can’t be revealed even to bank personnel or the directors themselves."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"use-guardio-to-protect-yourself-from-vishing-scams","style":"position:relative;"},"children":[{"type":"text","value":"Use Guardio to Protect Yourself from Vishing Scams"},{"type":"element","tagName":"a","properties":{"href":"#use-guardio-to-protect-yourself-from-vishing-scams","ariaLabel":"use guardio to protect yourself from vishing scams permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":" offers powerful protection against phishing scams, including vishing, and smishing by providing real-time alerts and safety checks. It monitors for suspicious activity and blocks malicious sites and links, effectively preventing you from being redirected to fake websites designed to steal your information. With "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":", you can browse with confidence, knowing that it's actively safeguarding your personal details from scammers looking to exploit them."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"frequently-asked-questions-faqs","style":"position:relative;"},"children":[{"type":"text","value":"Frequently Asked Questions (FAQs)"},{"type":"element","tagName":"a","properties":{"href":"#frequently-asked-questions-faqs","ariaLabel":"frequently asked questions faqs permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ol","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"What is a Vishing Attack?"}]}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Voice phishing or vishing is the act of instilling fear or causing panic to a victim through a spam call. This may include a solution to a fake problem, or some fake offers like a discounted auto warranty renewal."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"The goal of vishing is to attain sensitive info that only results in direct compromise of the victim. Also, hackers may "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"fake"}]},{"type":"text","value":", or "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"spoof"}]},{"type":"text","value":" their mobile numbers to add authenticity to a scam. Sometimes they can use voice changers to hide their identity."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ol","properties":{"start":2},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"What Does Vishing Mean?"}]}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Vishing is a modern-day cybercrime that involves telephony (VoIP) to commit phishing scams like stealing someone’s valuable info as a result of identity theft. Criminals often employ social engineering techniques to convince you to share this information."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ol","properties":{"start":3},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"What is the Difference Between Phishing and Vishing?"}]}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Phishing"}]},{"type":"text","value":" is a type of social engineering where a hacker sends a spam text or email to trick you into giving up your personal details, or perform an action—in this sense, running a program—like installing a malicious program into your system to compromise your "},{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"mobile security"}]},{"type":"text","value":". Phishing often involves emails, and messaging platforms."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Meanwhile, Vishing is the use of VoIP technology to commit cyberattacks through automated recordings, or real calls. Both scam methods have a common goal except one uses messaging platforms and the other uses phone calls."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ol","properties":{"start":4},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"What is Vishing in Cyber Crime?"}]}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Vishing in cybercrime"}]},{"type":"text","value":" is the act of making a fraudulent call, or a spam call to unsuspecting persons, in most cases, elderly people."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Further, the spammer tends to deliver fearsome messages to cause panic and hope that the victim will fall into their trap, and give up their essential information. This could be their social security details, or bank details. Sometimes they can ask you to buy fake offers."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ol","properties":{"start":5},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"What is Vishing in Cyber Crime?"}]}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Vishing in cybercrime"}]},{"type":"text","value":" is the act of making a fraudulent call, or a spam call to unsuspecting persons, in most cases, elderly people."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Further, the spammer tends to deliver fearsome messages to cause panic and hope that the victim will fall into their trap, and give up their essential information. This could be their social security details, or bank details. Sometimes they can ask you to buy fake offers."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h3","properties":{"id":"final-thoughts","style":"position:relative;"},"children":[{"type":"text","value":"Final Thoughts"},{"type":"element","tagName":"a","properties":{"href":"#final-thoughts","ariaLabel":"final thoughts permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"An effective mitigation strategy is to teach, or train the general public to acknowledge the traits of vishing frauds as well as how to detect phishing messages."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"A more technical approach, however, is to utilise a software detection tool to enhance "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"mobile security"}]},{"type":"text","value":". Usually, such mechanisms can distinguish between spam calls, and legit calls, or texts. Also, they can be more cheaply implemented compared to public training."}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"Vishing","slug":"vishing","keepLearning":[{"title":"VoIP","slug":"voip"},{"title":"WiFi","slug":"wifi"},{"title":"Wiretapping","slug":"wiretapping"}],"breadcrumb":{"location":"/dictionary/vishing","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/vishing","crumbLabel":"vishing"}]}}},"staticQueryHashes":["1614255152"]}