SMISHING: Beware Scams!

***

***

Smishing is a form of phishing that uses Short Message Service (SMS), commonly known as text messages, instead of email. Typically, the scammer poses as a legitimate institution, such as a bank, a service provider or a reputed company. The text message they send creates a sense of urgency or threatens consequences if the victim doesn’t respond immediately. It downloads malware on the phone or includes a link to a fraudulent website designed to look like the legitimate organization’s site. When victims reach that site they are tricked into entering their personal information.

Seven Types of Smishing Scams

1. Impersonation Scams: The attacker pretends to be a known organization or individual. The attack could be via a message pretending to be from a bank, government agency or a reputable company.
2. Tech Support Scams: Attackers pose as representatives from tech companies, claiming that the victim’s device or account has been compromised and that they need sensitive data to fix the problem.
3. Account Suspension Scams: These messages claim that an account (bank account, social media or any other service) has been suspended and prompt the victim to verify their identity by providing sensitive information.
4. Missed Delivery Scams: Attackers send messages claiming that the victim has missed a package delivery, and they need to provide personal details or a fee to reschedule the delivery.
5. Prize or Lottery Scams: Messages claiming that the victim has won a prize or a lottery, and they need to provide personal details or make a payment to claim the winnings.
6. Charity Scams: In these attacks, scammers impersonate a charitable organization, asking for donations, usually following a large-scale disaster or during holiday seasons.
7. Malware Link Scams: Messages containing a link, which when clicked, installs malware on the victim’s device, allowing the attacker to steal information or gain control over the device.

Attackers are constantly innovating and finding new ways to exploit human trust, so it’s crucial to be skeptical of any unsolicited or unexpected message that asks for sensitive information or prompts to click a link.

COMMENTS APPRECIATED

Refer and Subscribe

***

***

What is Cyber-Security SPOOFING and PHISHING?

By Staff Reporters

***

***

Spoofing 

Spoofing is when someone disguises an email address, sender name, phone number, or website URL—often just by changing one letter, symbol, or number—to convince you that you are interacting with a trusted source.

For example, you might receive an email that looks like it’s from your boss, a company you’ve done business with, or even from someone in your family—but it actually isn’t.

Criminals count on being able to manipulate you into believing that these spoofed communications are real, which can lead you to download malicious software, send money, or disclose personal, financial, or other sensitive information.

Phishing 

Phishing schemes often use spoofing techniques to lure you in and get you to take the bait. These scams are designed to trick you into giving information to criminals that they shouldn’t have access to.

In a phishing scam, you might receive an email that appears to be from a legitimate business and is asking you to update or verify your personal information by replying to the email or visiting a website. The web address might look similar to one you’ve used before. The email may be convincing enough to get you to take the action requested.

But once you click on that link, you’re sent to a spoofed website that might look nearly identical to the real thing—like your bank or credit card site—and asked to enter sensitive information like passwords, credit card numbers, banking PINs, etc. These fake websites are used solely to steal your information.

Phishing has evolved and now has several variations that use similar techniques:

  • Vishing scams happen over the phone, voice email, or VoIP (voice over Internet Protocol) calls.
  • Smishing scams happen through SMS (text) messages.
  • Pharming scams happen when malicious code is installed on your computer to redirect you to fake websites.

Spoofing and phishing are key parts of business email compromise scams.

MORE: https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/spoofing-and-phishing

***

COMMENTS APPRECIATED

Thank You

***

***

RELATED: https://www.amazon.com/Comprehensive-Financial-Planning-Strategies-Advisors/dp/1482240289/ref=sr_1_1?ie=UTF8&qid=1418580820&sr=8-1&keywords=david+marcinko

***