phone phishing

phone phishing
Using a phone call to obtain a person's personal, financial, or password data. Also: telephone phishing.
Example Citations:
One of the most prevalent and accessible methods of gaining access to personal data is the simple process of picking up the phone and calling a customer service call center. Customer service agents are trained to "take care" of callers and often will go to great lengths to be helpful. This is just what an identity thief is counting on. The concept of taking advantage of helpful customer service agents to steal information over the telephone is sometimes called phone phishing or pretext calling; in a broader context it can be referred to as social engineering. Phone phishing is particularly disturbing because unlike Internet phishing, the victim is not involved and is completely unaware that someone else is calling pretending to be them. With just a few calls, thieves can gain the bits and pieces of data required to assemble unquestioned access to a customer's accounts and other information.
— George T. Platt, "Phone Phishing: Are your Agents Too Helpful?," Connections Magazine, July/August 2005
For many of the most sophisticated Phishers, telephone Phishing has become the method of choice for harvesting personal information. Instead of directing you to a spoofed Web site, you'll receive an e-mail prompting you to call a customer support number. If you make the call, you'll be connected to a real person or receive an audio response requesting your account number, personal identification number and/or password — the personal data needed to initiate a successful identity theft.
— Al Winchell, "Phone Phishing latest technique to get your info," News-Press, August 1, 2005
Earliest Citation:
Many customers do not feel like typing their information into a secure shopping cart and want to make their orders using a cell phone. This is also a way to lose all of your personal info, as there are phishers who use ordinary police scanners to pick up cell phone calls beginning with the magic words, "I want to place an order."
— Sharon Freeman, "Phone Phishing," Forbes, October 18, 2004
There are four main ways that phone phishers obtain a person's sensitive data:
• Call the person, pretending to be an employee of a company.
• Get the person to call a phone number controlled by the phisher.
• Call a company, pretending to be the person.
• Eavesdrop on the person's cell phone calls.
Related Words: Categories:

New words. 2013.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Phishing — [ˈfɪʃɪŋ] werden Versuche von Tätern genannt, an Daten eines Internet Benutzers zu gelangen, z. B. über gefälschte WWW Adressen, E Mail oder Kurznachrichten, um die Benutzer zu schädigen (Kontoplünderung). Der Begriff ist ein englisches Kunstwort …   Deutsch Wikipedia

  • phishing — ( pp. Creating a replica of an existing Web page to fool a user into submitting personal, financial, or password data. adj. phish v. phisher n. Example Citations: Phishing is the term coined by hackers who imitate legitimate companies in …   New words

  • Phishing — In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic… …   Wikipedia

  • Phishing — Éste es un ejemplo de un intento de phishing. Haciéndose pasar por un email oficial, trata de engañar a los clientes del banco para que den información acerca de su cuenta con un enlace a la página …   Wikipedia Español

  • Phishing — Hameçonnage Exemple de phishing L’hameçonnage, appelé plus couramment phishing, est une technique utilisée par des fraudeurs pour obtenir des renseignements personnels dans le but de perpétrer une usurpation d identité. La technique consiste à… …   Wikipédia en Français

  • phishing — phreaking, phishing It is odd that the world of the Internet, which generally seeks to simplify matters of grammar and spelling, should have produced a complication in the spelling of these words with an initial ph . The earlier is phreaking,… …   Modern English usage

  • spear-phishing — pp. Phishing targeted at a specific person, usually by sending an e mail message crafted to appear as though it was sent by someone known to the recipient. Also: spear phishing, spearphishing. spear phish v. spear phish n. spear phisher n.… …   New words

  • puddle phishing — pp. Phishing that is targeted at a small company. puddle phishing adj. Example Citations: Scary statistics about Internet security were the subject of another speaker, David Culbertson, vice president, research and development, for Computer… …   New words

  • Mobile phone spam — is a form of spamming directed at the text messaging service of a mobile phone. It is described as mobile spamming, SMS spam, text spam or m spam. As the popularity of mobile phones surged in the early 2000s, frequent users of text messaging… …   Wikipedia

  • Evil twin phishing — Evil twin is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider. Wireless devices link to the Internet via hotspots nearby… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”