Phishing remains a popular technique but we see new forms of phishing arising such as spear-phishing, whaling, smishing and vishing.ENISA Threat Landscape (ETL) report 2023
What Happens If You Take the Bait?
SMS Phishing Attack Explained
Have you ever received a text message claiming to be from a financial institution informing you of a fraudulent transaction on your account, urging you to call a number, or access a page through a link? You are not alone. Fraudulent text messages are on the rise, with over 3.5 billion mobile users receiving spam texts on a daily basis. In this blog, we explain the intricacies of this type of social engineering attack.
Think before you click
What to do if you receive a call or text message that looks suspicious?
Imagine that bad actors have managed to break into your mobile operator’s network and you’ve just received a text message that looks suspicious. Before taking any action, pause for a moment and follow these steps to determine whether the message is legitimate, or a dangerous phishing scam. Here’s how you can avoid being scammed.
Seasonal scams to watch out for
How are SMS Spoofers Exploiting Global Trends?
Global events, holidays, and trends often generate excitement and chatter. They also offer attackers the perfect opportunity to use phishing and social engineering techniques to take advantage of people’s excitement. Black Friday, The World Cup, and a global pandemic are all events scammers have used to target victims. By taking advantage of people’s excitement, confusion, or generosity, attackers use social engineering to trick people into sharing their personal information.
How do Mobile Operators Protect You from SMS Scams?
What is Mobile Security?
Today, we live in a world that is more connected than ever. The devices we carry In our pockets connect us to a network of individuals, businesses, and services on a global scale. This interconnectedness opens mobile users up to a host of security risks, including phishing scam calls and texts, spam, and fraud. Discover more about mobile security, and what mobile network operators can do to protect you in this blog.