Recent Posts

Recent Blog Posts

The PhishLabs Blog

With Spoofed Calls on the Rise, FCC Seeks New ID Authentication Program

Posted by Elliot Volkman on Mar 14, '18

Spoofing a phone number is not a new concept, you probably get several calls from them a day, but with the accessibility of VoIP solutions and open source software spoofing a phone number is a breeze.

Telemarketers, robocalls, spammers, scammers, and even prank callers use it, and what once started as a simple grab and go of any available phone number has since evolved.

Read More

Topics: Vishing, Phone Fraud, Spoofing

Multiple Credit Card Breaches, Smartphone DDoS Attack, Developer Applications Targeted, and more | TWIC - October 2, 2015

Posted by Lindsey Havens on Oct 2, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Malware, DDoS, Fraud, Hacker Tools, The Week in Cybercrime, Phone Fraud, Data Breach, Hacked, Breach

Texting Malware, PoS System Targeting, Sniper Rifle Hack, and more | TWIC - July 31, 2015

Posted by Lindsey Havens on Jul 31, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Vulnerability, Hacker Tools, The Week in Cybercrime, Phone Fraud, Android, POS Attacks, Hacked, Patch, iOS

JP Morgan Arrests, Android Malware, Healthcare Threats, and more | TWIC - July 24, 2015

Posted by Lindsey Havens on Jul 24, '15

Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source).

Read More

Topics: Phishing, Malware, Hacker Tools, The Week in Cybercrime, Phone Fraud, Account Takeover, Android, Hacked, Patch, Arrests

How to stop a vishing or SMiShing attack (Part 1)

Posted by Stacy Shelley on Jan 24, '14

You’ve just been alerted to fraudulent phone calls or text messages claiming to be from your company that try to get your customers to provide their account information. What do you do? How do you respond? How do you stop them?

To answer these questions, it’s helpful to understand what a vishing or SMiShing attack entails. Sometimes referred to as phone phishing or VoIP phishing, vishing exploits the trust your customers have in your telephone communications to steal information that can be used to take over personal or business accounts.

Here’s an example of a phone phishing scenario:
Read More

Topics: Vishing, SMiShing, Phone Fraud

   

What's this all about?

The PhishLabs Blog is where we share our insights and thoughts on cybercrime and online fraud.

Recent Posts

Upcoming Events

Calendar_Mock_

Posts by Topic

see all