{"id":14851,"date":"2023-11-20T01:00:00","date_gmt":"2023-11-20T01:00:00","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=14851"},"modified":"2023-11-24T23:37:03","modified_gmt":"2023-11-24T23:37:03","slug":"vishing-what-it-is-how-to-prevent-it","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/cyber-security\/vishing-what-it-is-how-to-prevent-it\/","title":{"rendered":"Vishing: What It Is & How To Prevent It","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n
The term vishing is a portmanteau created from voice and phishing. Most people have heard of \u201cphishing\u201d, which involves enticing email or text messages into clicking on links to files or websites that harbor malware. The links may also appear in online advertisements that target consumers.<\/p>\n\n\n\n
Vishing uses verbal scams to trick people into doing things they believe are in their best interests. Vishing often picks up where phishing leaves off. It is typically considered a type of phishing, which itself is a type of social engineering. Vishing is concerned with voice communication, whereas phishing typically relies on email communication. <\/p>\n\n\n\n
Vishing attacks are carried out against both individuals and businesses, usually for monetary gain. However, it might also be motivated by other objectives, such as political, competitive or retaliatory activities.<\/p>\n\n\n\n
A vishing attack is\u00a0a type of\u00a0phishing attack\u00a0in which a threat actor uses social engineering tactics via voice communication to scam a target. The scammer may either try to convince a target to send them money or share any or all of the following sensitive information:<\/p>\n\n\n\n
Scammers who carry out vishing campaigns use an assortment of tactics to get their targets to divulge confidential information. They might call their targets directly or leave voice messages, play recorded messages, or speak directly to their targets. They might precede their calls with a text message or employ some other mechanism to bait the prospective victims.<\/p>\n\n\n\n
For example, a scammer might send a text message to a potential victim’s phone number, suggesting that there is a problem with the person’s bank account. This is followed by a voicemail message stating that the victim’s bank account experienced suspicious activity and is now locked down. The message then instructs the victim to call a specific telephone number and provide information to “verify the customer’s identity” or to “ensure that fraud has not occurred.”<\/p>\n\n\n\n
Vishing scammers commonly try to instill a sense of urgency or veiled threat when communicating with their victims. They use fear, excitement, greed and other emotional responses to get their victims to reveal confidential information before they have time to consider what they’re doing.<\/p>\n\n\n\n