SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Ever heard of vishing? It's short for 'voice phishing' and it's a sneaky social engineering
attack that plays out over the phone. Picture this: the attacker uses smooth-talking phone calls
or voice tricks to hoodwink folks into sharing sensitive info or doing things they shouldn't.
Vishing is all about pulling emotional strings – think urgency, fear, or a fake sense of
authority – to catch you off guard during those phone conversations.
During a vishing attack, the attacker typically poses as a legitimate entity, such as a bank
representative, government official, or IT support personnel. These scams can steal your
whole digital life: passwords, bank accounts, and even your identity.
Vishing vs Phishing
Vishing (Voice Phishing): Imagine you get a call, and the person on the other end claims to
be your bank or tech support, urging you to reveal your info urgently. That's vishing –
scammers using smooth talk over the phone to trick you into sharing sensitive details like
passwords or credit card numbers. They pretend to be someone you trust, creating a fake
sense of urgency or authority to catch you off guard during the call.
Phishing: Now, think of phishing as a trickster sending you a misleading email or a message
that looks legit. It could be posing as your bank, favorite shopping site, or even a colleague.
The goal is to lure you into clicking on a link or sharing your sensitive info on a fake website.
Phishing doesn't use phone calls; instead, it plays on your trust in electronic messages, aiming
to fool you into giving away your passwords or other personal details.
Common Tactics Used in Vishing Attacks Include:
1. Caller ID Spoofing: Attackers may manipulate caller ID information to make it
appear as though the call is coming from a trusted source.
2. Impersonation: The attacker might impersonate someone the target knows or a
representative from a trusted organization.
3. Urgency or Threats: Vishing calls often involve creating a sense of urgency or
threatening consequences to pressure the target into providing information or taking
specific actions.
4. Pretexting: Attackers may use a fabricated scenario or pretext to gain the trust of the
target before attempting to extract sensitive information.
Protecting Yourself from Vishing Attacks
To prevent vishing scams, don’t answer calls from unknown numbers, and don’t give out
private information over the phone. You should never give out or confirm private information
over the phone. Generally, most companies don’t call you to request such information. Don’t
call any phone numbers they provide to validate them, either — use Google or another
reliable source instead to find the information you need.
If you think you’re on a suspicious call, you should ask the caller for more specific details,
reasons for the call, or how they got your number. And while it may be rude, you can also
just hang up if you suspect a scam.
Additionally, avoid clicking on any links or following instructions provided during
unsolicited phone calls. Organizations often emphasize educating their employees and
customers about the risks of vishing and how to recognize and respond to such attacks.

Mais conteúdo relacionado

Semelhante a What is a Vishing Attack and How to Keep Yourself Secure.pdf

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 

Semelhante a What is a Vishing Attack and How to Keep Yourself Secure.pdf (20)

Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
Phish Phry- Analysis paper
Phish Phry- Analysis paper Phish Phry- Analysis paper
Phish Phry- Analysis paper
 
Anatomy of a Scam
Anatomy of a ScamAnatomy of a Scam
Anatomy of a Scam
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
The internet prospects
The internet prospects The internet prospects
The internet prospects
 
Infographic - What is Vishing?
Infographic - What is Vishing?Infographic - What is Vishing?
Infographic - What is Vishing?
 
Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)
 
Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Phishing
PhishingPhishing
Phishing
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

What is a Vishing Attack and How to Keep Yourself Secure.pdf

  • 1. Ever heard of vishing? It's short for 'voice phishing' and it's a sneaky social engineering attack that plays out over the phone. Picture this: the attacker uses smooth-talking phone calls or voice tricks to hoodwink folks into sharing sensitive info or doing things they shouldn't. Vishing is all about pulling emotional strings – think urgency, fear, or a fake sense of authority – to catch you off guard during those phone conversations. During a vishing attack, the attacker typically poses as a legitimate entity, such as a bank representative, government official, or IT support personnel. These scams can steal your whole digital life: passwords, bank accounts, and even your identity. Vishing vs Phishing Vishing (Voice Phishing): Imagine you get a call, and the person on the other end claims to be your bank or tech support, urging you to reveal your info urgently. That's vishing – scammers using smooth talk over the phone to trick you into sharing sensitive details like passwords or credit card numbers. They pretend to be someone you trust, creating a fake sense of urgency or authority to catch you off guard during the call. Phishing: Now, think of phishing as a trickster sending you a misleading email or a message that looks legit. It could be posing as your bank, favorite shopping site, or even a colleague. The goal is to lure you into clicking on a link or sharing your sensitive info on a fake website. Phishing doesn't use phone calls; instead, it plays on your trust in electronic messages, aiming to fool you into giving away your passwords or other personal details.
  • 2. Common Tactics Used in Vishing Attacks Include: 1. Caller ID Spoofing: Attackers may manipulate caller ID information to make it appear as though the call is coming from a trusted source. 2. Impersonation: The attacker might impersonate someone the target knows or a representative from a trusted organization. 3. Urgency or Threats: Vishing calls often involve creating a sense of urgency or threatening consequences to pressure the target into providing information or taking specific actions. 4. Pretexting: Attackers may use a fabricated scenario or pretext to gain the trust of the target before attempting to extract sensitive information. Protecting Yourself from Vishing Attacks To prevent vishing scams, don’t answer calls from unknown numbers, and don’t give out private information over the phone. You should never give out or confirm private information over the phone. Generally, most companies don’t call you to request such information. Don’t call any phone numbers they provide to validate them, either — use Google or another reliable source instead to find the information you need. If you think you’re on a suspicious call, you should ask the caller for more specific details, reasons for the call, or how they got your number. And while it may be rude, you can also just hang up if you suspect a scam. Additionally, avoid clicking on any links or following instructions provided during unsolicited phone calls. Organizations often emphasize educating their employees and customers about the risks of vishing and how to recognize and respond to such attacks.