SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

What Is SMiShing?
SMiShing is a mobile variant of phishing that involves the use of a text message, rather than an email, to catch the target in the phisher’s net. These attacks are highly reliant on the target’s compliance with the instructions the cybercriminal provides, as well.

These attacks can be more effective than the typical phishing attack, as the general public is increasingly aware of cyber threats--yet don’t expect these threats to manifest in their cell phone.

Just as one would experience in the ‘typical’ phishing attack, a ‘smisher’ will likely try to gain your trust in order to extract credentials. This ultimately allows them access to the accounts they obtained the credentials for, permitting them to wreak havoc and/or steal what they please. This is especially dangerous if they gain access to any client financial information you may have on file. Alternatively, some smishers will claim that if you don’t access a link and enter your personal information, that you will be charged daily for some service. Naturally, if this service is one that your organization has not signed up for, this message should be reported to IT and then disregarded.

How To Spot SMiShing Scams
First, if you suspect that a message is fraudulent, it never hurts to reach out to confirm that the message was sent by who it seems to have been. To do so, reach out via a different channel than your text, such as calling an official service number to speak directly to a representative. This allows you to confirm that the message was legitimate or fraudulent without exposing yourself or the business to greater risk.

In essence, avoid responding to text messages from senders that you don’t know--especially when the number is a 5000 number. This indicates that the message was actually an email sent as a text message, which is often a tactic used by scammers.

Finally, keep an eye out for any messages that contain downloadable apps. These are a favorite method to introduce malware to a mobile device. If an app doesn’t come from an official app store, it is likely a piece of disguised malware.

How To Be The Most Safe
If in doubt, confirm before you answer. Additionally, a VPN (or virtual private network) can help you maintain your mobile security, especially when paired with the practices outlined above.

Haber Group can help you to put these safeguards, and others, in place for your business devices. Give us a call at 866.625.3560 to get started.

Tip of the Week: Ransomware Is Exploding… Is Your ...
Who Needs To Be Involved In Network Security? Simp...
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Hackers Malware Business Internet Business Computing Computer Microsoft Hosted Solutions Software Backup Windows 10 Network Security Ransomware Google Android Mobile Devices IT Services Smartphone User Tips Hardware Small Business Data Management Managed IT Services Windows Gmail Tech Term Productivity Browser Business Continuity Server Cloud Computing Saving Money Internet of Things App Data Facebook Office 365 Upgrade Disaster Recovery Smartphones Phishing Managed Service Provider Artificial Intelligence Cybersecurity Word Efficiency Business Management Data Recovery Encryption IT Support Remote Monitoring Big Data Productivity Microsoft Office Spam Windows 10 IT Support Tip of the week Data Backup Workplace Tips Social Media Government Office Tips Chrome Infrastructure Innovation Outsourced IT Apple YouTube communications Miscellaneous Analytics Data storage Risk Management Vulnerability Antivirus VoIP Robot Money Employer-Employee Relationship Customer Service Firewall Passwords Communication Applications WiFi Settings Avoiding Downtime Two-factor Authentication The Internet of Things Content Filtering Managed IT Services IT Management Bandwidth Recovery Telephone Systems Mobile Device Maintenance Storage Website Search Virtual Reality IBM Scam Tablet Paperless Office Wireless Administration SaaS Outlook Monitors Customer Relationship Management Apps Wi-Fi Printing Unified Threat Management Hacking VPN Holiday Data Security Augmented Reality Automation HIPAA End of Support Data loss Business Technology Network Computing Virtual Private Network Safety Password Hacker Google Drive BYOD Presentation Server Management Mouse Vendor Management Hosted Solution Save Money Office Mobile Security Wireless Technology LiFi Windows 8 Computers Cooperation Solar Statistics Break Fix Cookies Samsung Virtualization Spyware Superfish Websites Identity Theft Work Knowledge Google Wallet Black Friday Regulations Address Sports Business Growth Hotspot Professional Services Quick Tips User Error Education Current Events Retail Multi-Factor Security Mirgation Users Voice over Internet Protocol Uninterrupted Power Supply Patch Management Mobile Office Microsoft Excel Star Wars Training Display Staff Automobile Business Intelligence Bluetooth Legal Dark Web Nanotechnology Language USB Optimization Experience Unified Communications Drones Cyber Monday Social Networking Hard Drives Corporate Profile Alt Codes Dark Data VoIP Going Green Social Engineering Google Calendar Chatbots Solid State Drive Mobile Device Management Running Cable Blockchain Cost Management Virtual Desktop Social Printer Wearable Technology Net Neutrality Screen Reader How To Networking Computing Infrastructure Dongle Recycling User IT service Heating/Cooling Smart Technology Motherboard Remote Computing Refrigeration WannaCry Buisness Typing Public Speaking Time Management IT solutions Legislation Identity Hard Disk Drive Lithium-ion battery Laptop Deep Learning Humor Permissions Assessment Firefox Hacks Access Control Cabling Operating System FCC Smart Tech Competition Cryptocurrency Alerts Service Level Agreement Digital Payment eWaste BDR Servers Budget Distributed Denial of Service Router 5G Network Management Cortana How To Comparison Chromebook Halloween Bring Your Own Device sip Fraud Internet Exlporer Politics Techology Fun SharePoint Collaboration Cables Managed IT Title II Connectivity Bitcoin Network Congestion Licensing Continuity Google Maps Managed IT Service Modem Undo Digital Lenovo Downtime Tech Support Document Management Smart Office Touchscreen Information Technology Specifications Compliance Marketing Mail Merge Scary Stories Best Practice telephony Value Unified Threat Management Writing Downloads IT Technicians File Sharing Gadgets Wires Application Disaster Shortcut IP Address Cybercrime Google Docs Online IoT Computer Care Error Physical Security Upgrades Black Market Point of Sale Travel Law Enforcement Notifications G Suite CrashOverride Botnet Supercomputer 3D Printing Twitter Domains Motion Sickness FinTech Gadget Staffing Personal Information Administrator Company Culture Crowdsourcing Taxes Machine Learning IT Budget Unsupported Software Web Server Emergency Update GPS Computer Repair Managing Stress IT Consultant Relocation Mobile Data Processors Cameras Meetings Tracking Health Cleaning Private Cloud Alert CCTV Emoji Webcam Mobile Computing Electronic Medical Records Work/Life Balance