{"id":2037482,"date":"2024-11-25T05:15:35","date_gmt":"2024-11-25T10:15:35","guid":{"rendered":"https:\/\/cybeready.com\/?p=20197"},"modified":"2024-11-25T05:15:35","modified_gmt":"2024-11-25T10:15:35","slug":"voice-phishing-attacks-how-to-prevent-and-respond-to-them","status":"publish","type":"post","link":"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/","title":{"rendered":"Voice Phishing Attacks: How to Prevent and Respond to Them"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Have you ever received a call from an unknown number and wondered who could be on the other end? It could be a vishing scam. <strong>Vishing, a combination of &#8220;voice&#8221; and &#8220;phishing&#8221;,<\/strong> is a fraudulent scheme that aims to trick you into revealing sensitive information.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">During a vishing call, a skilled scammer uses social engineering tactics to manipulate you into divulging personal and financial details. They might pose as your bank, claim that your account has been compromised, or offer to help with software installation \u2013 which could actually be a malicious program. It&#8217;s important to note that vishing is just one form of phishing, a widespread threat that can appear in emails, texts, phone calls, or direct messages. The ultimate goal is always to steal your identity or your hard-earned money.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to the 2022 FBI&#8217;s <\/span><a href=\"https:\/\/www.forbes.com\/advisor\/business\/phishing-statistics\/\"  rel=\"noopener external\" data-wpel-link=\"external\"><span style=\"font-weight: 400;\">Internet Crime Complaint Center report<\/span><\/a><span style=\"font-weight: 400;\">, phishing victims lost $52,089,159 in the U.S. alone.\u00a0 In this article, we will delve into <a href=\"https:\/\/cybeready.com\/successful-phishing-simulation\/how-to-train-your-employees-to-spot-voice-phishing\"  rel=\"noopener\" data-wpel-link=\"internal\">voice phishing<\/a>, its workings, common Vishing attacks, and strategies to prevent and educate oneself to avoid falling victim to this scam.<\/span><\/p>\n<h3><b>Common Vishing Attacks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In the United States, telephone communication is the predominant method of fraud. Here are some typical examples of vishing attacks you should be aware of:<\/span><\/p>\n<h4><b>Banking Scams<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Vishing attackers target valuable financial information like bank accounts and credit card numbers. They employ a deceptive tactic called <\/span><span style=\"font-weight: 400;\">ID spoofing<\/span><span style=\"font-weight: 400;\">, where they pretend to be a legitimate entity by using a genuine-looking ID. For instance, a scammer could pose as a CFO or financial department employee and convince the victim to transfer funds to an offshore account.<\/span><\/p>\n<h4><b>Unexpected Loan and Investment Offers<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Scammers often make tempting calls to offer unrealistically attractive deals, promising fast debt solutions or instant wealth. These offers usually come with a sense of urgency and require a fee. Beware, as a legitimate lender or investor would only initiate contact or make overly generous offers with your request.<\/span><\/p>\n<h4><b>Frauds on Social Security and Medicare<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Elderly victims are particularly vulnerable to scams committed over the phone. Fraudsters will frequently pretend to be Medicare or Social Security Administration representatives. They might try to obtain sensitive information, such as Medicare or Social Security numbers, or threaten to suspend or terminate benefits. Stolen data can then be exploited to steal money or redirect benefits.<\/span><\/p>\n<h4><b>Tax Frauds<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Scammers often send prerecorded messages claiming to be from the Income Tax Department, alerting victims to issues with their tax returns. To make matters worse, they even manipulate caller IDs to make it appear that the call is genuinely from the IRS.<\/span><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-20204 size-full\" src=\"https:\/\/cybeready.com\/wp-content\/uploads\/unnamed3.png\" alt=\"Voice Phishing Attacks\" width=\"512\" height=\"384\" srcset=\"https:\/\/cybeready.com\/wp-content\/uploads\/unnamed3.png 512w, https:\/\/cybeready.com\/wp-content\/uploads\/unnamed3-300x225.png 300w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/p>\n<h3><b>Cybersecurity Measures<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In today&#8217;s digital age, awareness of the threats posed by vishing attacks is crucial. These deceptive attempts to extract personal information can lead to identity theft, fraud, and other <\/span><span style=\"font-weight: 400;\">cybercrimes<\/span><span style=\"font-weight: 400;\">. Taking these preventative measures will help you avoid being a victim of vishing:<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Guard Your Personal Information:<\/b> <span style=\"font-weight: 400;\">Never disclose sensitive details such as passwords, financial information, or multi-factor authentication (MFA) codes over the phone. Remember, legitimate organizations will never ask for this information via phone.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Verify the Caller&#8217;s Identity: <\/b><span style=\"font-weight: 400;\">Scammers often pretend to be representatives from trusted organizations. Before sharing any personal information, ensure that the caller&#8217;s name and contact details can be verified through official channels. If the caller discourages this, it&#8217;s likely a scam.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Beware of Prepaid or Gift Card Requests: <\/b><span style=\"font-weight: 400;\">Legitimate businesses never ask for payment via prepaid or gift cards. If a caller demands payment using these methods, it&#8217;s a red flag for fraud.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Don&#8217;t Grant Remote Access: <\/b><span style=\"font-weight: 400;\">Be cautious of anyone requesting remote access to your computer, especially if they need to be a verified member of your IT department. Giving unauthorized individuals access can lead to malware infections or compromise your credentials.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Report Suspected Attacks: <\/b><span style=\"font-weight: 400;\">If you encounter a suspicious incident, report it immediately. By notifying the authorities or your organization&#8217;s security personnel, you can help safeguard others from falling victim to vishing schemes.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">While technology can help restrict the impact of phishing attacks, vishing presents its own distinct set of challenges. To effectively combat these attacks, organizations must adopt a thorough threat model and grasp the motivations of the attackers. By assessing various scenarios like <\/span><a href=\"https:\/\/www.acebizservices.com\/post\/6-common-types-of-malware\"  rel=\"noopener external\" data-wpel-link=\"external\"><span style=\"font-weight: 400;\">malware infections<\/span><\/a><span style=\"font-weight: 400;\">, compromised credentials, or unauthorized device access, countermeasures can be strategically implemented to thwart assailants, even in the face of undetected vishing calls.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One such countermeasure could be the use of a <\/span><a href=\"https:\/\/cybernews.com\/best-vpn\/\"  rel=\"noopener external\" data-wpel-link=\"external\"><span style=\"font-weight: 400;\">reliable Virtual Private Network (VPN)<\/span><\/a><span style=\"font-weight: 400;\"> to encrypt internet connections and safeguard sensitive data. VPNs can add a layer of security that makes it much more difficult for attackers to compromise systems and data. For example, if you use a Windows device, a specifically OS-fitted VPN will make your surfing way more secure.<\/span><\/p>\n<h3><b>Protecting Yourself After a Vishing Attack<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Taking immediate action is crucial if you suspect you have fallen victim to a scammer and given them your financial information.\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Contact your financial institution, whether it&#8217;s your credit card issuer, bank, or Medicare.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Request a block on any future charges and the termination of fraudulent transactions.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Additionally, changing your account numbers can help prevent unauthorized use.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Freeze your credit reports to stop anyone from opening new accounts in your name.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lastly, report your situation to the relevant authorities in your country.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Stay vigilant and know the warning signs of <a href=\"https:\/\/cybeready.com\/security-culture\/the-hidden-economy-of-vishing-attacks\"  rel=\"noopener\" data-wpel-link=\"internal\">vishing<\/a> attacks before answering the phone. By doing so, you can stay one step ahead of cybercriminals who want to steal your personal information.<\/span><\/p>\n<h3><b>Conclusion<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In today&#8217;s interconnected world, a dangerous phishing technique called vishing poses a significant threat. Unsuspecting individuals are targeted, leading to severe financial and reputational harm, including bank fraud and tax scams. To protect ourselves, we must understand the tactics used by these attackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By familiarizing ourselves with the common signs of a vishing attack and acting responsibly, we can significantly reduce the risk of falling victim. <strong>This means never sharing sensitive information over a call, verifying caller identities, refusing prepaid card payment requests, denying remote access to devices, and reporting any suspicious activity<\/strong>.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Despite taking these precautions, it&#8217;s still possible to become a victim. In such cases, swift action is crucial. Alerting financial institutions, changing account numbers, freezing credit reports, and filing complaints can help limit the damage and prevent further exploitation.<\/span><\/p>\n<p>The post <a href=\"https:\/\/cybeready.com\/security-culture\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\" data-wpel-link=\"internal\">Voice Phishing Attacks: How to Prevent and Respond to Them<\/a> appeared first on <a href=\"https:\/\/cybeready.com\/\" data-wpel-link=\"internal\">CybeReady<\/a>.<\/p>\n\n<p class=\"syndicated-attribution\">*** This is a Security Bloggers Network syndicated blog from <a href=\"https:\/\/cybeready.com\/blog\">Cyber Security Awareness Training Blog | CybeReady<\/a> authored by <a href=\"https:\/\/securityboulevard.com\/author\/0\/\" title=\"Read other posts by Nitzan Gursky\">Nitzan Gursky<\/a>. Read the original post at: <a href=\"https:\/\/cybeready.com\/security-culture\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\">https:\/\/cybeready.com\/security-culture\/voice-phishing-attacks-how-to-prevent-and-respond-to-them<\/a> <\/p>","protected":false},"excerpt":{"rendered":"<p>Have you ever received a call from an unknown number and wondered who could be on the other end? It could be a vishing scam. Vishing, a combination of \u201cvoice\u201d and \u201cphishing\u201d, is a fraudulent scheme that aims to trick you into revealing sensitive information.\u00a0 During a vishing call, a skilled scammer uses social engineering [\u2026]<\/p>\n<p>The post <a href=\"https:\/\/cybeready.com\/security-culture\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\" data-wpel-link=\"internal\">Voice Phishing Attacks: How to Prevent and Respond to Them<\/a> appeared first on <a href=\"https:\/\/cybeready.com\/\" data-wpel-link=\"internal\">CybeReady<\/a>.<\/p>\n","protected":false},"author":11521,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21132,5],"tags":[1594],"class_list":["post-2037482","post","type-post","status-publish","format-standard","hentry","category-devops","category-sbn","tag-security-culture"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Voice Phishing Attacks: How to Prevent and Respond to Them - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Have you ever received a call from an unknown number and wondered who could be on the other end? It could be a vishing scam. Vishing, a combination of \u201cvoice\u201d and \u201cphishing\u201d, is a fraudulent scheme that aims to trick you into revealing sensitive information.\u00a0 During a vishing call, a skilled scammer uses social engineering The post Voice Phishing Attacks: How to Prevent and Respond to Them appeared first on CybeReady.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Voice Phishing Attacks: How to Prevent and Respond to Them\" \/>\n<meta property=\"og:description\" content=\"Have you ever received a call from an unknown number and wondered who could be on the other end? It could be a vishing scam. Vishing, a combination of \u201cvoice\u201d and \u201cphishing\u201d, is a fraudulent scheme that aims to trick you into revealing sensitive information.\u00a0 During a vishing call, a skilled scammer uses social engineering The post Voice Phishing Attacks: How to Prevent and Respond to Them appeared first on CybeReady.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-25T10:15:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1524\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nitzan Gursky\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@securityblvd\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/\",\"url\":\"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/\",\"name\":\"Voice Phishing Attacks: How to Prevent and Respond to Them - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybeready.com\/wp-content\/uploads\/unnamed3.png\",\"datePublished\":\"2024-11-25T10:15:35+00:00\",\"dateModified\":\"2024-11-25T10:15:35+00:00\",\"author\":{\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/c0c1109cf08cc99921cb6708fab475b7\"},\"description\":\"Have you ever received a call from an unknown number and wondered who could be on the other end? It could be a vishing scam. Vishing, a combination of \u201cvoice\u201d and \u201cphishing\u201d, is a fraudulent scheme that aims to trick you into revealing sensitive information.\u00a0 During a vishing call, a skilled scammer uses social engineering The post Voice Phishing Attacks: How to Prevent and Respond to Them appeared first on CybeReady.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/#primaryimage\",\"url\":\"https:\/\/cybeready.com\/wp-content\/uploads\/unnamed3.png\",\"contentUrl\":\"https:\/\/cybeready.com\/wp-content\/uploads\/unnamed3.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Bloggers Network\",\"item\":\"https:\/\/securityboulevard.com\/category\/sbn\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Voice Phishing Attacks: How to Prevent and Respond to Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/c0c1109cf08cc99921cb6708fab475b7\",\"name\":\"Nitzan Gursky\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/560d9e75ecd917c40dae54731838fb5c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/560d9e75ecd917c40dae54731838fb5c?s=96&d=mm&r=g\",\"caption\":\"Nitzan Gursky\"},\"sameAs\":[\"https:\/\/cybeready.com\"],\"url\":\"https:\/\/securityboulevard.com\/author\/nitzan-gursky\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Voice Phishing Attacks: How to Prevent and Respond to Them - Security Boulevard","description":"Have you ever received a call from an unknown number and wondered who could be on the other end? It could be a vishing scam. Vishing, a combination of \u201cvoice\u201d and \u201cphishing\u201d, is a fraudulent scheme that aims to trick you into revealing sensitive information.\u00a0 During a vishing call, a skilled scammer uses social engineering The post Voice Phishing Attacks: How to Prevent and Respond to Them appeared first on CybeReady.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/","og_locale":"en_US","og_type":"article","og_title":"Voice Phishing Attacks: How to Prevent and Respond to Them","og_description":"Have you ever received a call from an unknown number and wondered who could be on the other end? It could be a vishing scam. Vishing, a combination of \u201cvoice\u201d and \u201cphishing\u201d, is a fraudulent scheme that aims to trick you into revealing sensitive information.\u00a0 During a vishing call, a skilled scammer uses social engineering The post Voice Phishing Attacks: How to Prevent and Respond to Them appeared first on CybeReady.","og_url":"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_published_time":"2024-11-25T10:15:35+00:00","og_image":[{"width":1524,"height":512,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg","type":"image\/jpeg"}],"author":"Nitzan Gursky","twitter_card":"summary_large_image","twitter_creator":"@securityblvd","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/","url":"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/","name":"Voice Phishing Attacks: How to Prevent and Respond to Them - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/#primaryimage"},"thumbnailUrl":"https:\/\/cybeready.com\/wp-content\/uploads\/unnamed3.png","datePublished":"2024-11-25T10:15:35+00:00","dateModified":"2024-11-25T10:15:35+00:00","author":{"@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/c0c1109cf08cc99921cb6708fab475b7"},"description":"Have you ever received a call from an unknown number and wondered who could be on the other end? It could be a vishing scam. Vishing, a combination of \u201cvoice\u201d and \u201cphishing\u201d, is a fraudulent scheme that aims to trick you into revealing sensitive information.\u00a0 During a vishing call, a skilled scammer uses social engineering The post Voice Phishing Attacks: How to Prevent and Respond to Them appeared first on CybeReady.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/#primaryimage","url":"https:\/\/cybeready.com\/wp-content\/uploads\/unnamed3.png","contentUrl":"https:\/\/cybeready.com\/wp-content\/uploads\/unnamed3.png"},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Security Bloggers Network","item":"https:\/\/securityboulevard.com\/category\/sbn\/"},{"@type":"ListItem","position":3,"name":"Voice Phishing Attacks: How to Prevent and Respond to Them"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/c0c1109cf08cc99921cb6708fab475b7","name":"Nitzan Gursky","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/560d9e75ecd917c40dae54731838fb5c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/560d9e75ecd917c40dae54731838fb5c?s=96&d=mm&r=g","caption":"Nitzan Gursky"},"sameAs":["https:\/\/cybeready.com"],"url":"https:\/\/securityboulevard.com\/author\/nitzan-gursky\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p91vu9-8y2C","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/11521"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=2037482"}],"version-history":[{"count":1,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037482\/revisions"}],"predecessor-version":[{"id":2037483,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037482\/revisions\/2037483"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=2037482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/categories?post=2037482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/tags?post=2037482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}