We are independent & ad-supported. We may earn a commission for purchases made through our links.

Advertiser Disclosure

Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.

How We Make Money

We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently from our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.

What is Phone Phishing?

Mary Elizabeth
By
Updated May 17, 2024
Our promise to you
WiseGEEK is dedicated to creating trustworthy, high-quality content that always prioritizes transparency, integrity, and inclusivity above all else. Our ensure that our content creation and review process includes rigorous fact-checking, evidence-based, and continual updates to ensure accuracy and reliability.

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

Editorial Standards

At WiseGEEK, we are committed to creating content that you can trust. Our editorial process is designed to ensure that every piece of content we publish is accurate, reliable, and informative.

Our team of experienced writers and editors follows a strict set of guidelines to ensure the highest quality content. We conduct thorough research, fact-check all information, and rely on credible sources to back up our claims. Our content is reviewed by subject matter experts to ensure accuracy and clarity.

We believe in transparency and maintain editorial independence from our advertisers. Our team does not receive direct compensation from advertisers, allowing us to create unbiased content that prioritizes your interests.

Phishing is a type of scam most closely associated with email, but also carried out through other media. In a phishing scam, the scammer tries to entice the target into revealing important information, often in the form of a credit card number, a Social Security number, a bank account number, and/or a user name and password combination. In an email or website phishing attack, the target is led by graphics and text to believe that a legitimate authority is seeking information and the goal is to have the target click a link, enter information and/or download malware. Phone phishing — which was around prior to email under a different name — is one type of phishing scam, and one that — according to experts — has been on the increase since computer users have become educated about email phishing.

Phone phishing is based mainly on acting. The caller, representing himself or herself as a representative of a financial institution most often, tries to convince the target that he or she may have suffered a security breach and he or she must provide account details over the phone in order for the financial institution to ascertain whether this has happened. Alternate methods to lend veracity to their claim include using an automated message, or a call requesting that the target go to a website and enter the information impersonally, rather than tell it to the caller, but using a spoof website address.

Another added trick used in phone phishing is Caller ID spoofing. Caller ID spoofing is the substitution of an alternate Caller ID for the actual phone number from which the caller is placing the call. This can be done for legitimate purposes, such as law enforcement, but is also a way to set the concerns of a target at rest. One can place a call through a website from anywhere in the world and appear to be calling from a financial institution around the corner from the target. The Truth in Caller ID Act of 2010, which by May 2010 had passed the House of Representatives but not yet passed the Senate, would make Caller ID spoofing a crime with some particular exceptions including use by law enforcement and the ability to block one’s own caller ID.

There are some simple steps to avoiding being entrapped by phone phishing. Recall that legitimate businesses will never ask for account information over the phone. Test the veracity of any request for information by calling the organization that any suspicious phone call seems to come using a phone number from published information, such as a billing statement or an account balance record, that you know to be accurate.

WiseGEEK is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Mary Elizabeth
By Mary Elizabeth
Passionate about reading, writing, and research, Mary Elizabeth is dedicated to correcting misinformation on the Internet. In addition to writing articles on art, literature, and music for WiseGEEK, Mary works as a teacher, composer, and author who has written books, study guides, and teaching materials. Mary has also created music composition content for Sibelius Software. She earned her B.A. from University of Chicago's writing program and an M.A. from the University of Vermont.

Discussion Comments

Mary Elizabeth

Mary Elizabeth

Passionate about reading, writing, and research, Mary Elizabeth is dedicated to correcting misinformation on the Internet. In addition to writing articles on art, literature, and music for WiseGEEK, Mary works as a teacher, composer, and author who has written books, study guides, and teaching materials. Mary has also created music composition content for Sibelius Software. She earned her B.A. from University of Chicago's writing program and an M.A. from the University of Vermont.
WiseGEEK, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGEEK, in your inbox

Our latest articles, guides, and more, delivered daily.