Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

What Is SMiShing?
SMiShing is a mobile variant of phishing that involves the use of a text message, rather than an email, to catch the target in the phisher’s net. These attacks are highly reliant on the target’s compliance with the instructions the cybercriminal provides, as well.

These attacks can be more effective than the typical phishing attack, as the general public is increasingly aware of cyber threats--yet don’t expect these threats to manifest in their cell phone.

Just as one would experience in the ‘typical’ phishing attack, a ‘smisher’ will likely try to gain your trust in order to extract credentials. This ultimately allows them access to the accounts they obtained the credentials for, permitting them to wreak havoc and/or steal what they please. This is especially dangerous if they gain access to any client financial information you may have on file. Alternatively, some smishers will claim that if you don’t access a link and enter your personal information, that you will be charged daily for some service. Naturally, if this service is one that your organization has not signed up for, this message should be reported to IT and then disregarded.

How To Spot SMiShing Scams
First, if you suspect that a message is fraudulent, it never hurts to reach out to confirm that the message was sent by who it seems to have been. To do so, reach out via a different channel than your text, such as calling an official service number to speak directly to a representative. This allows you to confirm that the message was legitimate or fraudulent without exposing yourself or the business to greater risk.

In essence, avoid responding to text messages from senders that you don’t know--especially when the number is a 5000 number. This indicates that the message was actually an email sent as a text message, which is often a tactic used by scammers.

Finally, keep an eye out for any messages that contain downloadable apps. These are a favorite method to introduce malware to a mobile device. If an app doesn’t come from an official app store, it is likely a piece of disguised malware.

How To Be The Most Safe
If in doubt, confirm before you answer. Additionally, a VPN (or virtual private network) can help you maintain your mobile security, especially when paired with the practices outlined above.

Haber Group can help you to put these safeguards, and others, in place for your business devices. Give us a call at 866.625.3560 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 22 October 2017

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Email Malware Technology Business Hosted Solutions Internet Microsoft Windows 10 Computer Backup Business Computing Software Ransomware User Tips IT Services Productivity Network Security Hardware Smartphone Windows Google Data Management Data Phishing App Facebook Upgrade Saving Money Android Mobile Devices Gmail Small Business Business Continuity Word Internet of Things Tip of the week Smartphones Workplace Tips Efficiency Office Tips Browser Microsoft Office Big Data IT Support Cloud Computing Cybersecurity Social Media Disaster Recovery Data Recovery Managed Service Provider Customer Service Apple Settings Managed IT Services Content Filtering Office 365 Server Robot Remote Monitoring Innovation WiFi Data storage Spam Miscellaneous Artificial Intelligence IBM Antivirus Search Wireless Mobile Device Money Apps Customer Relationship Management Administration Hacking Firewall VoIP Password Passwords Presentation Encryption Hacker Avoiding Downtime Network Office Wireless Technology Windows 10 Recovery Hosted Solution End of Support YouTube communications Productivity Risk Management Save Money Printing Employer-Employee Relationship Virtual Private Network IT Support Google Drive SaaS Safety Managed IT Services Unified Threat Management IT Management LiFi The Internet of Things Telephone Systems Monitors Chrome Analytics Outsourced IT Outlook Computer Care Social Sports Communication WannaCry Education Vendor Management Humor Time Management Deep Learning Writing Training User Hacks Cabling Automobile Data loss Wi-Fi Business Technology Budget Competition sip Network Management Bring Your Own Device Retail Managed IT Infrastructure Buisness Mouse Digital IT solutions 5G Lenovo telephony Touchscreen Best Practice Social Engineering Shortcut Disaster Marketing Spyware Cortana Two-factor Authentication Superfish Storage Business Growth Downtime IP Address Patch Management Current Events Politics Uninterrupted Power Supply Legal Collaboration Scam Website Dark Data Alt Codes Tablet Cybercrime How To Mobile Office Vulnerability Going Green Solid State Drive File Sharing How To Knowledge Hard Drives Networking Heating/Cooling Typing Samsung IT service Network Congestion Mobile Device Management VPN Websites Hard Disk Drive Operating System Firefox Unified Communications Virtual Reality Experience Refrigeration Data Security Public Speaking Servers Cryptocurrency BDR Running Cable Computers Virtual Desktop Lithium-ion battery Computing Augmented Reality Techology Server Management Bitcoin Google Maps Laptop Display Mail Merge Information Technology Undo Unified Threat Management Google Docs Fun Statistics Windows 8 Halloween Gadgets Maintenance Digital Payment Application Address Google Wallet Virtualization User Error Quick Tips Bluetooth Scary Stories Automation Users Corporate Profile Bandwidth Data Backup Drones VoIP Work/Life Balance Error Emergency Access Control Point of Sale Black Market Law Enforcement Physical Security Paperless Office Twitter Staffing Gadget Administrator Personal Information Web Server Remote Computing GPS Mobile Computing Holiday Business Management Computer Repair Cameras Processors Tracking CrashOverride Health CCTV Alert Document Management Tech Support Electronic Medical Records Domains Identity Theft Travel G Suite Notifications Upgrades Supercomputer Botnet Motion Sickness Taxes Crowdsourcing 3D Printing IT Budget Machine Learning Update IT Consultant Government Unsupported Software Relocation Meetings Chromebook Cleaning BYOD Mobile Data Private Cloud Printer Webcam Emoji