We use cookies to improve your experience on our website. By continuing to browse, you agree to our use of cookies.
Phishing, smishing and vishing are all attempts to defraud you through email, mobile, and telephoning scams respectively. Letting you guard down just once can lead to a cascade of a serious losses.
Phishing, smishing and vishing are all attempts to defraud you through email, mobile, and telephoning scams respectively. Letting your guard down just once can lead to a cascade of a serious losses.
Many ways to defraud you
Phishing, smishing, vishing defined
Phishing is a scam that takes place by email. A typical phishing attack occurs when a legitimate-looking email, appearing to come from a bank or other financial institution, is sent to you requesting you to click on a link to update or verify your personal or account information.
The fraudsters often try to scare you into opening a phishing email by saying 'Your account has been accessed' or 'Your account will be blocked', or they entice you to click on links by saying 'You have had a large deposit made into your account' or 'You need to install new software to protect yourself'. When you click on the link in the email, it directs you to a legitimate-looking website. After you enter your personal details, account details, PIN and password on the fake website, the information is forwarded to the fraudsters, who are then able to access your bank account allowing them to transfer funds from your account into specially opened bank accounts. These accounts are then cleared of the transferred funds within minutes.
Smishing is much like phishing, except that text messages sent to cellphones are used rather than emails. In a smishing message you could be requested to click on a link in the text and be redirected to a legitimate-looking website where you are requested to supply your personal and/or account information, just as you would in a phishing scam. You could also be requested to contact a tollfree number where a fake automated voice-response system requests you to provide personal information, such as passwords and PINs.
Vishing entails social engineering over the telephone where you are called and lured into divulging personal information to an automated system. Fraudsters also use a technique called ‘caller identity spoofing’, where calls appear to be made from a legitimate or known number, allowing the fraudster to obtain your personal details.
Phishing involving email accounts
This phishing scam involves the collection of usernames and passwords for email accounts by cybercriminals. Once they have this information, they hijack the email account and if the account is used for banking or business purposes, they impersonate the accountholder and order goods or services, request that banks make transactions on their behalf or notify business clients of a change of banking details.
How does a cybercriminal gain access to your email account?
You receive an email that purports to be from Hotmail, Google, Yahoo, etc (email addresses ending with gmail, yahoo, etc) stating one of the following:
Other tactics include posing as a company such as SARS and requesting you to log on to your email account through the provided links to access your online tax information.
You could also unknowingly download malware on your computer when you open an unsolicited email or click on a link in an email. When you click on the link provided you will be taken to a fake site that looks similar to your service provider’s site or are provided with a fake form to complete. Once you insert your login details, the details are collected by the cybercriminals and used to hijack your email account.
Apart from being able to send mails using your email address, the cybercriminals also have the ability to create a rule in your mailbox to move any mails from a specific sender to folders on their own personal computers. You will be totally unaware that your email credentials and confidentiality have been compromised.
What could the cybercriminals do once they have access to your email account?
Signs that your email address has been compromised
Telephonic technical-support scams
This is where someone posing as a representative of an IT Company (eg Microsoft) contacts people and offers to assist them with solving a computer problem, or offers to remove viruses, or tries to sell them a software licence.
These so called representatives then request you to access a website or click on a link that will allow them to access your computer so that they can do the repairs, remove viruses or download the software you purchased. Once they have accessed your computer, they will be able to do any or all of the following:
Tips to protect yourself from phishing, smishing and vishing
Banks and other financial institutions use your cellphone as a way to verify your identify. Avoid SIM swaps with these tips.
Malware is any malicious software designed to hack or damage your computer, gaining sensitive information without your knowledge.
Malware is any malicious software designed to hack or damage your computer, gaining sensitive information without your knowledge. Protect your business with these steps.
Banks and other financial institutions use your cellphone as a way to verify your identify. Avoid SIM swaps with these tips.
Malware is any malicious software designed to hack or damage your computer, gaining sensitive information without your knowledge.
Malware is any malicious software designed to hack or damage your computer, gaining sensitive information without your knowledge. Protect your business with these steps.