8 Cases of Vishing and How to Avoid Them

More it looks like with fraud than with threat to her better safety at cyberspace, vishing is known as a effort theft of information or money through phone, persuading and deceiving the victim.

In they The calls, The crooks they use often privacy ή information that have a acquired from previous ones attacks in cyberspace or scams to gain his trust victim and eventually cheat it.


Η threatening she increases recent years and, such as and many other scams and attacks, begins to is done and its staff and more popular among the crooks and of criminals of cyber space. Ο λόγος for this is that is in this respect easy to executed, great scale, simple and often succesful. Ο way action not requires none technique investment, none knowledge code or IT, rather than just basic information that is easily available on the Internet.

According recent study of Truecaller, 26% of citizens of USA lost money from phone scam in the year 2022. The rate this demonstrates two significantly points: that his of species The attacks they increase and that people have a received minimum education in this respect with these attacks.

Ο more ordinary type of vishing is n impersonation one known ή prominent face, such as a governmental official, a customer ή a colleague. Purpose the fraudster's goal is to obtain sensitive information, for example numbers social security, numbers taxpayers ή codes access. Usually aim at sensitive personal information, but is more possible the victim to convinced to give codes access, The which it can to have a wider effects.

In rare cases, scammers it can to try to persuade their employees to pay money or to pay for fake invoices, order to steal money of company. Irrespective of their targets and The methods που they use The crooks, ο single way to the prevention his of species of attacks is a suitable program awareness of workers and of users.

This This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. article Provides a comprehensive overview eight common examples vishing, the who The employees/users they can know in advance to avoid to fall into the trap.

1. AI-based vishing

For cheaters, artificial intelligence is becoming an increasingly useful tool for the implementation wicked and malicious intentions and already we watch the artificial intelligence to contribute in social engineering scams like the vishing Artificial intelligence it can to locate patterns without continuous human contribution and it can yet and to locate different publications. This means that just ο algorithm locate a motif, it can to start to This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. is being processed automatically.

Furthermore, some software artificial intelligence they can to imitate The human voices and to fool easily their employees, that to believe they are talking with One supervisor ή manager.2021 Has been same to you a large scale attack in cyberspace in 2021 using cloned voices.

The Criminals of cyberspace που realized she the attack they used artificial intelligence to imitate the voice one executives company, that to convince the Director of bank via phone carry 35 million dollars on frame of the bank takeover process.

The incident this was one of the first that connected directly the artificial intelligence with a threatening at cyberspace, using deep voice learning technology to imitate the speaking, the slope of the voice and the pronunciation of executive to carry out the attack at cyberspace. With the use of a variety of speech patterns where is easily available from social media, YouTube and difference texts interviews, η TN can pose a significant threat to each organism.

2. Robocalls

Η attack includes a pre-recorded phone call in every telephone number into a specific area code via computer software. A automated voice calls the victim to give his name and other information. The answers their recorded and used to steal money or create fake credit cards.

Fortunately, those calls are now so usual which most people them they recognize and they close the phone right away just receive the call. The international calls and The blocked numbers are same to you signs such attacks.


The VoIP is one great technology that allowed amazing business innovations, but fraudsters can easily create fake ones numbers and to carry out attacks. She η technique can be combined with robotic calls, but more often the calls are done by people.

The best way to prevent those calls are to request by the attacker to sent details by e-mail, where η attack it can easily to detected, or ask for from the attacker to continue This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. rest of of call talking direct together of.

4. Falsification of caller ID

He ο type of attack can be particularly destructive because it uses software to the falsification legal ones number identity caller. Scammers usually are present the call as derived from governmental service ή institution, such as tax office, police station or hospital, and they use This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. pretext that is urgent for to convince the victim to provides information that normally will not was giving

Those attacks are hard to spot and the best way to avoid them is to ensure that The calls transferred into a another means, similar with This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. VoIP. Some meters telephony and of physics security they can detect and to reject complete videos they The fake identities caller.

5. Dumpster Diving

Such as suggests the name, the attacks they are carried out using information collected from their buckets waste of company. The official ones corporate documents contain often several personal information that they can used for the dismissal one enough successful attack vishing.

The best way to the fighting of so called "dumpster diving" he is simple. All The companies will must shred the sensitive corporate documents before the fly at bucket of waste. Either you use an outside company or you buy One destroyer for office your, is a investment που worth the trouble, data of potential risks.

6. Technical support call

Η attack she is widespread in large companies where employees not they know or not have met When something member of the technical support department. The scammers they pretend that the computer must be informed ή to repaired and they ask One password for the do.

Education is key to countering these attacks. You remind often to users that they do not will never ask them to reveal their password from This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. phone and what not to do When to reveal the their password in no case.

7. Voicemail fraud

This attack is different and Concerns voicemail notifications. Many smartphones and apps send emails to notify their users for the saved voice messages. These emails contain usually a link for the hearing of vocal message. That's all the malicious emails have as a aim to direct users to One site and to put them to download malware at device their.

Η prevention her of fraud requires appropriate education for the recognition of messages electronics "fishing". Recommended to check the address electronics mail of sender, as messages that's all contain usually spelling Mistakes ή a logo improperly sized and not shipped from official name sector.

8.Customer calls

The crooks που they do those attacks, after they find old invoices via of "diving into a buckets waste" που is described above, often they are pretending the customer of your company and they require the payment of invoice. With This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. pretext that hurry, trying to persuade the victim to adjust This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. debt and yes steal money from the company.

This scam constitutes classic example of why all The Companies they require the authorization two people for the payment invoice ή the money transfer. So, a a second person not involved in the attack can review the process and maybe to capable spot some attempt fraud ή fraud/theft.

Education is the key

The vishing is a by increasing attacks. The best way to the fighting of this type fraud is to ensured that users they know and they can they recognize they The scams/attacks. The simulations vishing are as simple as phishing simulations and should be a core part of campaigns education awareness into a issues cyber security.

The best way to find out if your body runs through risk is to you try constantly and adjust depending the defenses you. The scammers and The cyber criminals always rely on situations crisis, situations emergency and scenarios that force people to "throw The defenses their".

Η reminder to users and their employees of how are unfolding these situations and which ones indications they indicate they is η more effective energy που they can to They do for to avoid The attacks vishing. If The users and The Employees they are well trained above on subject, the steps to avoid or the prevention of vishing attacks are simple and have a high success rate.

The attacks they is same whether they target one person or a whole company. The training of your staff in this respect with the vishing it can to help in protecting the position and of livelihood of, such a at the office as much as and at home.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.097 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).