Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Security Digest

 Be Ware! New  Financial service Fraudsters tactics.  Fraudsters never stand still. Financial service customers have become conditioned to be wary of  potential phishing emails following years  of being inundated with phishing attacks and spam. This fact makes it harder for bilkers to lure victims with a artfully designed email and website, so they are experimenting with newer tactics now. Attackers moving to other channels where people are less suspecting, such as through smishing,  vishing  and social networks.  smishing: is short for "SMS phishing. " Smishing is an attack the user is tricked into downloading a trojan horse or a virus onto  his cellphone or other mobile device. Cellphone users have started receiving SMS with these lines, for example:  "We are informing you have signed up for our service.  You will be charged $3 per day unless you cancel your subscription: somephishinlink.com"   vishing: voice or VoIP phishing  is an electronic fraud tactic in which individuals are tricked into revealing critical financial or personal information to unauthorized entities.  Vishing works like phishing but does not always occur over the Internet and is carried out using voice technology. A vishing attack can be conducted by landline, voice email, VoIP or cellular telephone. The victim receives a voice message,  often generated by speech synthesis, indicating that some suspicious activity has taken place  in a credit card or bank account,  mortgage account or other financial service in their name.   The victim is told to call a specific telephone number and provide information to "verify identity" or to "ensure that fraud does not occur."  If the attack is carried out by telephone, caller ID spoofing can cause the victim's set to indicate a legitimate source, such as a bank or a government agency. 
More info available at here

______________________________________________________

To stop receiving emails, click here


This post first appeared on Unsuccess, please read the originial post: here

Share the post

Security Digest

×

Subscribe to Unsuccess

Get updates delivered right to your inbox!

Thank you for your subscription

×