Vishing

7th January 2020 | Cybrary Vishing


Vishing is the fraudulent practice of making phone calls or leaving voice messages pretending to be from reputable companies in order to have individuals give out personal information, up to and including banking or credit card numbers. This is similar to phishing, but vishing is conducted over the phone instead of email.  In recent years, vishing has been combined with website hacks that display a virus warning from “Microsoft” and ask you to call the Microsoft Support line to remove the virus immediately or suffer DIRE consequences.  This combined attack preys on the elderly and less computer savvy individuals and has cost consumers millions of dollars.

What can your SMB do?

Vishing is on the rise, nearly half (49%) of information security businesses experienced vishing in 2018. Vishers will keep attacking due to the lack of knowledge of the threat by the general public, according to ProofPoint, 63% of the public they surveyed had no clue what vishing was. What can be done? 

  1. Train your employees on how to spot and avoid vishing attacks. 
  2. Register with a paid robocall blocking service
  3. Inform your company’s IT department about any potential scam calls or emails.
  4. File an official complaint with the FTC and local, state, or federal law enforcement agencies.

Related Terms: Phishing, Spear-Phishing, Smishing, Whaling

Source: Oxford Dictionary

To understand more about Vishing, watch this video of a recreated vishing call:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more
Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more
Malicious Chrome Extension Disguised as  a Business Tools

Malicious Chrome Extension Disguised as a Business Tools

If a Chrome extension promises to remove security pop-ups and generate MFA codes, that should make you...

Read more