SlideShare a Scribd company logo
1 of 2
Download to read offline
Ever heard of vishing? It's short for 'voice phishing' and it's a sneaky social engineering
attack that plays out over the phone. Picture this: the attacker uses smooth-talking phone calls
or voice tricks to hoodwink folks into sharing sensitive info or doing things they shouldn't.
Vishing is all about pulling emotional strings – think urgency, fear, or a fake sense of
authority – to catch you off guard during those phone conversations.
During a vishing attack, the attacker typically poses as a legitimate entity, such as a bank
representative, government official, or IT support personnel. These scams can steal your
whole digital life: passwords, bank accounts, and even your identity.
Vishing vs Phishing
Vishing (Voice Phishing): Imagine you get a call, and the person on the other end claims to
be your bank or tech support, urging you to reveal your info urgently. That's vishing –
scammers using smooth talk over the phone to trick you into sharing sensitive details like
passwords or credit card numbers. They pretend to be someone you trust, creating a fake
sense of urgency or authority to catch you off guard during the call.
Phishing: Now, think of phishing as a trickster sending you a misleading email or a message
that looks legit. It could be posing as your bank, favorite shopping site, or even a colleague.
The goal is to lure you into clicking on a link or sharing your sensitive info on a fake website.
Phishing doesn't use phone calls; instead, it plays on your trust in electronic messages, aiming
to fool you into giving away your passwords or other personal details.
Common Tactics Used in Vishing Attacks Include:
1. Caller ID Spoofing: Attackers may manipulate caller ID information to make it
appear as though the call is coming from a trusted source.
2. Impersonation: The attacker might impersonate someone the target knows or a
representative from a trusted organization.
3. Urgency or Threats: Vishing calls often involve creating a sense of urgency or
threatening consequences to pressure the target into providing information or taking
specific actions.
4. Pretexting: Attackers may use a fabricated scenario or pretext to gain the trust of the
target before attempting to extract sensitive information.
Protecting Yourself from Vishing Attacks
To prevent vishing scams, don’t answer calls from unknown numbers, and don’t give out
private information over the phone. You should never give out or confirm private information
over the phone. Generally, most companies don’t call you to request such information. Don’t
call any phone numbers they provide to validate them, either — use Google or another
reliable source instead to find the information you need.
If you think you’re on a suspicious call, you should ask the caller for more specific details,
reasons for the call, or how they got your number. And while it may be rude, you can also
just hang up if you suspect a scam.
Additionally, avoid clicking on any links or following instructions provided during
unsolicited phone calls. Organizations often emphasize educating their employees and
customers about the risks of vishing and how to recognize and respond to such attacks.

More Related Content

Similar to What is a Vishing Attack and How to Keep Yourself Secure.pdf

Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Okan YILDIZ
 
Phish Phry- Analysis paper
Phish Phry- Analysis paper Phish Phry- Analysis paper
Phish Phry- Analysis paper Joydeep Banerjee
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
The internet prospects
The internet prospects The internet prospects
The internet prospects FawazIbraheem1
 
Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Christopher Lean APFS
 
Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Christopher Lean APFS
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxssuserb73103
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docxMehwishAnsari11
 

Similar to What is a Vishing Attack and How to Keep Yourself Secure.pdf (20)

Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
Phish Phry- Analysis paper
Phish Phry- Analysis paper Phish Phry- Analysis paper
Phish Phry- Analysis paper
 
Anatomy of a Scam
Anatomy of a ScamAnatomy of a Scam
Anatomy of a Scam
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
The internet prospects
The internet prospects The internet prospects
The internet prospects
 
Infographic - What is Vishing?
Infographic - What is Vishing?Infographic - What is Vishing?
Infographic - What is Vishing?
 
Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)
 
Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)Spanish investment regulator warning (chiringuitos)
Spanish investment regulator warning (chiringuitos)
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Phishing
PhishingPhishing
Phishing
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 

Recently uploaded (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 

What is a Vishing Attack and How to Keep Yourself Secure.pdf

  • 1. Ever heard of vishing? It's short for 'voice phishing' and it's a sneaky social engineering attack that plays out over the phone. Picture this: the attacker uses smooth-talking phone calls or voice tricks to hoodwink folks into sharing sensitive info or doing things they shouldn't. Vishing is all about pulling emotional strings – think urgency, fear, or a fake sense of authority – to catch you off guard during those phone conversations. During a vishing attack, the attacker typically poses as a legitimate entity, such as a bank representative, government official, or IT support personnel. These scams can steal your whole digital life: passwords, bank accounts, and even your identity. Vishing vs Phishing Vishing (Voice Phishing): Imagine you get a call, and the person on the other end claims to be your bank or tech support, urging you to reveal your info urgently. That's vishing – scammers using smooth talk over the phone to trick you into sharing sensitive details like passwords or credit card numbers. They pretend to be someone you trust, creating a fake sense of urgency or authority to catch you off guard during the call. Phishing: Now, think of phishing as a trickster sending you a misleading email or a message that looks legit. It could be posing as your bank, favorite shopping site, or even a colleague. The goal is to lure you into clicking on a link or sharing your sensitive info on a fake website. Phishing doesn't use phone calls; instead, it plays on your trust in electronic messages, aiming to fool you into giving away your passwords or other personal details.
  • 2. Common Tactics Used in Vishing Attacks Include: 1. Caller ID Spoofing: Attackers may manipulate caller ID information to make it appear as though the call is coming from a trusted source. 2. Impersonation: The attacker might impersonate someone the target knows or a representative from a trusted organization. 3. Urgency or Threats: Vishing calls often involve creating a sense of urgency or threatening consequences to pressure the target into providing information or taking specific actions. 4. Pretexting: Attackers may use a fabricated scenario or pretext to gain the trust of the target before attempting to extract sensitive information. Protecting Yourself from Vishing Attacks To prevent vishing scams, don’t answer calls from unknown numbers, and don’t give out private information over the phone. You should never give out or confirm private information over the phone. Generally, most companies don’t call you to request such information. Don’t call any phone numbers they provide to validate them, either — use Google or another reliable source instead to find the information you need. If you think you’re on a suspicious call, you should ask the caller for more specific details, reasons for the call, or how they got your number. And while it may be rude, you can also just hang up if you suspect a scam. Additionally, avoid clicking on any links or following instructions provided during unsolicited phone calls. Organizations often emphasize educating their employees and customers about the risks of vishing and how to recognize and respond to such attacks.