Pulse Technology Solutions Blog

View the blog entries posted by James Ritter. IT blogs covering cloud, security, best practices, how-tos, and more.

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

What Is SMiShing?
SMiShing is a mobile variant of phishing that involves the use of a text message, rather than an email, to catch the target in the phisher’s net. These attacks are highly reliant on the target’s compliance with the instructions the cybercriminal provides, as well.

These attacks can be more effective than the typical phishing attack, as the general public is increasingly aware of cyber threats--yet don’t expect these threats to manifest in their cell phone.

Just as one would experience in the ‘typical’ phishing attack, a ‘smisher’ will likely try to gain your trust in order to extract credentials. This ultimately allows them access to the accounts they obtained the credentials for, permitting them to wreak havoc and/or steal what they please. This is especially dangerous if they gain access to any client financial information you may have on file. Alternatively, some smishers will claim that if you don’t access a link and enter your personal information, that you will be charged daily for some service. Naturally, if this service is one that your organization has not signed up for, this message should be reported to IT and then disregarded.

How To Spot SMiShing Scams
First, if you suspect that a message is fraudulent, it never hurts to reach out to confirm that the message was sent by who it seems to have been. To do so, reach out via a different channel than your text, such as calling an official service number to speak directly to a representative. This allows you to confirm that the message was legitimate or fraudulent without exposing yourself or the business to greater risk.

In essence, avoid responding to text messages from senders that you don’t know--especially when the number is a 5000 number. This indicates that the message was actually an email sent as a text message, which is often a tactic used by scammers.

Finally, keep an eye out for any messages that contain downloadable apps. These are a favorite method to introduce malware to a mobile device. If an app doesn’t come from an official app store, it is likely a piece of disguised malware.

How To Be The Most Safe
If in doubt, confirm before you answer. Additionally, a VPN (or virtual private network) can help you maintain your mobile security, especially when paired with the practices outlined above.

Pulse Technology Solutions can help you to put these safeguards, and others, in place for your business devices. Give us a call at 239-362-9902 to get started.

Tip of the Week: Ransomware Is Exploding… Is Your ...
Here’s How We Help You Avoid Tech Trouble


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 19 October 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Business Computing Best Practices Malware Privacy Network Security Hackers Productivity Backup Managed IT Services Software IT Services Ransomware Microsoft Outsourced IT Business User Tips IT Support Internet Business Continuity Mobile Devices Windows 10 Email Computer Managed IT Efficiency Google Smartphone Social Media Productivity Disaster Recovery Hosted Solutions Unified Threat Management Hardware Data Backup Remote Monitoring Android Recovery Workplace Tips Data Recovery Save Money Cloud Computing Tip of the week Work/Life Balance Communication IT Support Managed IT Services Office 365 App Data Data Management SaaS Managed Service Provider Training Cybersecurity Apps Innovation Word Windows Big Data Firewall Internet of Things Paperless Office Robot Mobile Device Small Business Telephone Systems Collaboration Browser IT Service Facebook Hosted Solution Smartphones How To Risk Management Content Filtering Phishing File Sharing Password Windows 10 Automobile Mobility Mobile Device Management VoIP Files Artificial Intelligence Twitter Data Storage Going Green Encryption Education Taxes Virtualization Health IT Management VoIP Websites Alert BDR Botnet Samsung Virtual Reality Money Antivirus Politics Virtual Private Network Wireless Hacker Computer Care Vendor Management Physical Security Uninterrupted Power Supply BYOD Network Superfish Search IT Solutions Customer Relationship Management Cameras Black Market Wi-Fi Scam Solid State Drive Office Tips Supercomputer G Suite Microsoft Office Upgrades YouTube Computer Repair Assessment CCTV Heating/Cooling Networking Office Hard Disk Drive IT Budget Law Enforcement Outlook Bandwidth Settings Upgrade Consultation Licensing Tech Support Remote Computing Servers Data Security Administrator Digital Payment Gadget Help Desk Shortcut Digital Software Tips IT Consultant Budget Emoji Processors Server Management Techology WiFi Business Management Cybercrime Business Growth Patch Management Spyware Electronic Medical Records Quick Tips Computing Statistics Maintenance GPS Unsupported Software Server Travel Holiday Sports Vulnerability Social Employer-Employee Relationship Google Drive History Virus Wireless Technology Bluetooth IBM Tracking Downtime Tablet Motion Sickness VPN Avoiding Downtime Project Management Cabling Information Technology Error Sync Corporate Profile Document Management Apple Meetings Computers How To Time Management Infrastructure Cleaning Private Cloud Cortana Mobile Device Managment Crowdsourcing Hacking WannaCry Analytics Mobile Data Customer Service Webcam Telephony USB Mail Merge Network Management Business Technology Disaster Public Cloud Identity Theft Government Legal Trending Monitors Chrome Google Maps Point of Sale Update Automation Address Personal Information Notifications Touchscreen Lenovo Staffing Communications Unified Threat Management Data loss Firefox Web Server Chromebook Redundancy User Error Hacks Thank You Congratulations Disaster Resistance Proactive IT CrashOverride IT Consulting Emergency Data Breach Technology Laws Cost Management

Newsletter Sign Up