Vishing

7th January 2020 | Cybrary Vishing


Vishing is the fraudulent practice of making phone calls or leaving voice messages pretending to be from reputable companies in order to have individuals give out personal information, up to and including banking or credit card numbers. This is similar to phishing, but vishing is conducted over the phone instead of email.  In recent years, vishing has been combined with website hacks that display a virus warning from “Microsoft” and ask you to call the Microsoft Support line to remove the virus immediately or suffer DIRE consequences.  This combined attack preys on the elderly and less computer savvy individuals and has cost consumers millions of dollars.

What can your SMB do?

Vishing is on the rise, nearly half (49%) of information security businesses experienced vishing in 2018. Vishers will keep attacking due to the lack of knowledge of the threat by the general public, according to ProofPoint, 63% of the public they surveyed had no clue what vishing was. What can be done? 

  1. Train your employees on how to spot and avoid vishing attacks. 
  2. Register with a paid robocall blocking service
  3. Inform your company’s IT department about any potential scam calls or emails.
  4. File an official complaint with the FTC and local, state, or federal law enforcement agencies.

Related Terms: Phishing, Spear-Phishing, Smishing, Whaling

Source: Oxford Dictionary

To understand more about Vishing, watch this video of a recreated vishing call:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more