Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

What Is SMiShing?
SMiShing is a mobile variant of phishing that involves the use of a text message, rather than an email, to catch the target in the phisher’s net. These attacks are highly reliant on the target’s compliance with the instructions the cybercriminal provides, as well.

These attacks can be more effective than the typical phishing attack, as the general public is increasingly aware of cyber threats--yet don’t expect these threats to manifest in their cell phone.

Just as one would experience in the ‘typical’ phishing attack, a ‘smisher’ will likely try to gain your trust in order to extract credentials. This ultimately allows them access to the accounts they obtained the credentials for, permitting them to wreak havoc and/or steal what they please. This is especially dangerous if they gain access to any client financial information you may have on file. Alternatively, some smishers will claim that if you don’t access a link and enter your personal information, that you will be charged daily for some service. Naturally, if this service is one that your organization has not signed up for, this message should be reported to IT and then disregarded.

How To Spot SMiShing Scams
First, if you suspect that a message is fraudulent, it never hurts to reach out to confirm that the message was sent by who it seems to have been. To do so, reach out via a different channel than your text, such as calling an official service number to speak directly to a representative. This allows you to confirm that the message was legitimate or fraudulent without exposing yourself or the business to greater risk.

In essence, avoid responding to text messages from senders that you don’t know--especially when the number is a 5000 number. This indicates that the message was actually an email sent as a text message, which is often a tactic used by scammers.

Finally, keep an eye out for any messages that contain downloadable apps. These are a favorite method to introduce malware to a mobile device. If an app doesn’t come from an official app store, it is likely a piece of disguised malware.

How To Be The Most Safe
If in doubt, confirm before you answer. Additionally, a VPN (or virtual private network) can help you maintain your mobile security, especially when paired with the practices outlined above.

Haber Group can help you to put these safeguards, and others, in place for your business devices. Give us a call at 866.625.3560 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 13 December 2017

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Hackers Privacy Technology Business Email Malware Internet Hosted Solutions Microsoft Windows 10 Computer Business Computing Backup Small Business Ransomware IT Services Software Network Security Hardware Smartphone Windows Google User Tips Productivity Android Data Browser Data Management Upgrade Saving Money Smartphones Mobile Devices Gmail Business Continuity Phishing App Facebook Office 365 Tip of the week Workplace Tips Managed IT Services Efficiency Remote Monitoring Office Tips Microsoft Office Cloud Computing IT Support Big Data Artificial Intelligence Word Internet of Things Data Recovery Outsourced IT Robot Risk Management Employer-Employee Relationship IT Support Innovation WiFi Productivity Data storage Spam Miscellaneous Cybersecurity Social Media Money Disaster Recovery Government Managed Service Provider Firewall Customer Service Apple Settings Server Content Filtering Tablet YouTube communications Printing Virtual Private Network Computing Google Drive End of Support Managed IT Services Safety LiFi IT Management Telephone Systems Save Money The Internet of Things Maintenance Chrome Analytics Data Backup SaaS Outlook IBM Antivirus Search Unified Threat Management Wireless Monitors Apps Customer Relationship Management Hacking Administration VoIP Password Passwords Mouse Presentation Hacker Encryption Avoiding Downtime Mobile Device Office Two-factor Authentication Network Wireless Technology Windows 10 Recovery Hosted Solution Alt Codes Retail Website Cybercrime Google Calendar Dark Data Solid State Drive Going Green Mobile Office Net Neutrality Vulnerability Hard Drives Knowledge Networking How To Typing Social Engineering Legislation Heating/Cooling IT service VPN Business Management Hard Disk Drive Mobile Device Management FCC Refrigeration Experience Data Security Firefox Operating System Unified Communications BDR Cryptocurrency Public Speaking Running Cable Comparison Servers Politics Collaboration Lithium-ion battery Virtual Desktop Title II Techology Augmented Reality Google Maps Bitcoin How To Laptop Specifications Server Management Mail Merge File Sharing Information Technology Online Fun Network Congestion Undo Unified Threat Management Google Docs Samsung Websites Windows 8 Halloween Black Friday Statistics Application Address Gadgets Google Wallet Virtual Reality Microsoft Excel Computers Virtualization User Error Quick Tips Scary Stories Cyber Monday Bluetooth Users Corporate Profile Drones Bandwidth Display Printer VoIP Social Sports Smart Technology WannaCry Education Deep Learning Access Control Time Management Humor Cabling Hacks Distributed Denial of Service User Digital Payment Business Technology Data loss Budget Wi-Fi Bring Your Own Device Automation Competition SharePoint Network Management sip BYOD Infrastructure Buisness Managed IT Service Managed IT Lenovo Digital 5G IT solutions Best Practice Communication Downloads Computer Care Touchscreen telephony Disaster Vendor Management Break Fix Shortcut Cortana Superfish Marketing Spyware Business Growth Writing Multi-Factor Security Training Storage Automobile Uninterrupted Power Supply Current Events IP Address Downtime Dark Web Patch Management Scam Legal Staffing Gadget Administrator Personal Information Web Server Remote Computing Domains GPS Holiday Computer Repair Cameras Processors Tracking Health CCTV Alert Tech Support Document Management Electronic Medical Records Identity Theft Travel G Suite Notifications Botnet Upgrades Supercomputer Motion Sickness Taxes Crowdsourcing Machine Learning 3D Printing IT Budget Emergency Update IT Consultant Relocation Unsupported Software Meetings Chromebook Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error Mobile Computing Point of Sale Black Market Law Enforcement Physical Security Paperless Office CrashOverride Twitter