Blog Posts Tagged with "Vishing"
August 28, 2012 Added by:Ben Rothke
It is no myth that there is plenty of money and digital assets on networks worldwide. Those that want to secure those assets need to safeguard them. This book is written specifically for smaller to medium size businesses that often lack the staff and budget necessary to ensure effective information security...
March 30, 2012 Added by:Robert Siciliano
Vishing occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft...
December 17, 2010 Added by:Robert Siciliano
The name comes from “voice,” and “phishing,” which is, of course, the use of spoofed emails designed to trick targets into clicking malicious links. Instead of email, vishing generally relies on automated phone calls, which instruct targets to provide account numbers...
December 07, 2010 Added by:Simon Heron
VOIP has tremendous benefits for business users – which include cost savings and greater productivity – but like anything else it comes with associated security risks for the corporate network, and these risks must be identified prior to VOIP being rolled out...
October 08, 2010 Added by:Katie Weaver-Johnson
Financial institutions that take a futuristic approach to delivering consistent consumer education to their customers on an ongoing basis – and I don’t just mean fliers in statements or web site banners – will build more trust, more accountability and more customers than those that don’t...
October 11, 2009 Added by:Sean Inman
On Friday 10/09/2009 it was reported in a ISC Diary update a new Vishing scheme is making its way across AT&T, Sprint and T-Mobiles networks. Vishing is the cousin of Phishing, but this latest attempt indicates that its still a practical method of attack. The recent attack starts with a text message that reports a problem with the victims account. They’re instructed to dial a...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013