We use cookies to improve your experience on our website. By continuing to browse, you agree to our use of cookies.
Phishing, smishing and vishing are all attempts to defraud you through email, mobile, and telephoning scams respectively. Letting you guard down just once can lead to a cascade of a serious losses.
Phishing is a scam
that takes place by email. A typical phishing attack happens when a legitimate-looking email, which appears to be from a bank or other financial institution, is sent to an individual requesting you to update or verify your personal or account information.
Fraudsters often try to scare you into opening a phishing email for example by saying “Your account has been accessed” or “Your account will be blocked,” or they entice you to click on links by saying “There was a large deposit made into your account”. When you click on the link in the email, it directs you to a legitimate-looking website. After you enter your personal details, account details, PIN and password on the fake website, the information is forwarded to the fraudsters, who are then able to access your bank account allowing them to transfer funds from your account into fraudulent bank accounts within minutes. This phishing scam happens when cybercriminals collect usernames and passwords for email accounts. Once they have the information, they hijack email accounts and if the accounts are used for banking or business purposes, they impersonate the account holders and order goods or services, request that banks make transactions on their behalf or notify business clients of a change of banking details.
Smishing is much like phishing, except that it involves text messages sent to cellphones. In a smishing message you could be asked to click on a link in the text whereafter you will be redirected to a legitimate-looking website asking you to supply your personal and/or account information, just as you would in a phishing scam. You could also be asked to call a toll-free number where a fake automated voice-response system will ask you to provide personal information, such as passwords and PINs.
Vishing entails social engineering over the telephone. Fraudsters call you and lure you into giving personal information to an automated voice-response system. Fraudsters also use a technique called 'caller identity spoofing', where calls appear to be made from a legitimate or known number, allowing fraudsters to get your personal details.
How do cybercriminals get access to your email account?
You receive an email that purports to be from Hotmail, Google or Yahoo stating one of the following:
Other tactics include posing as a company asking you to log on through the
provided links to access your online information.
You could also unknowingly download malware on your computer when you open an unsolicited email or click on a link in an email. You will be taken to a fake website that looks the same as your service provider's site or you may be asked to complete a fake form. Once you enter your login details, cybercriminals steal
your details and use them to hijack your email account.
Apart from being able to send mails using your email address, cybercriminals
also create a rule in your mailbox to move any mails from a specific sender to
folders on their own computers. You will be totally unaware that your email
credentials and confidentiality have been compromised.
What can the cybercriminals do once they have access to your email account?
Signs that your email account has been compromised
Telephonic technical-support scams
These scams happen when someone posing as a representative of an IT company (e.g. Microsoft) contacts you and offers to help you with solving a computer problem, or offers to remove viruses or tries to sell you a software licence.
These 'representatives' then ask you to go to a website or to click on a link that will allow them to access your computer remotely so that they can do the repairs, remove viruses or download the software you bought. Once they have accessed your computer, they can do any or all of the following
Tips to protect you from phishing, smishing and vishing
Banks and other financial institutions use your cellphone as a way to verify your identify. Avoid SIM swaps with these tips.
Whaling is a form of phishing that targets businesses by sending emails to finance departments impersonating a chief executive or chief financial officer to trick employees into making deposits. Employees then process the payment, as they believe that the request came from a senior executive, and the fraudsters get away with the money. Financial institutions and private businesses are the primary targets for whaling scams, which generally require a lot of planning to be successful
A lot of fraud stems indirectly from identity theft. And many victims only realise their identities have been stolen and misused when they apply for credit.
Banks and other financial institutions use your cellphone as a way to verify your identify. Avoid SIM swaps with these tips.
Whaling is a form of phishing that targets businesses by sending emails to finance departments impersonating a chief executive or chief financial officer to trick employees into making deposits. Employees then process the payment, as they believe that the request came from a senior executive, and the fraudsters get away with the money. Financial institutions and private businesses are the primary targets for whaling scams, which generally require a lot of planning to be successful
A lot of fraud stems indirectly from identity theft. And many victims only realise their identities have been stolen and misused when they apply for credit.