We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Internet

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is Phone Phishing?

Mary Elizabeth
By
Updated: May 17, 2024
Views: 3,694
Share

Phishing is a type of scam most closely associated with email, but also carried out through other media. In a phishing scam, the scammer tries to entice the target into revealing important information, often in the form of a credit card number, a Social Security number, a bank account number, and/or a user name and password combination. In an email or website phishing attack, the target is led by graphics and text to believe that a legitimate authority is seeking information and the goal is to have the target click a link, enter information and/or download malware. Phone phishing — which was around prior to email under a different name — is one type of phishing scam, and one that — according to experts — has been on the increase since computer users have become educated about email phishing.

Phone phishing is based mainly on acting. The caller, representing himself or herself as a representative of a financial institution most often, tries to convince the target that he or she may have suffered a security breach and he or she must provide account details over the phone in order for the financial institution to ascertain whether this has happened. Alternate methods to lend veracity to their claim include using an automated message, or a call requesting that the target go to a website and enter the information impersonally, rather than tell it to the caller, but using a spoof website address.

Another added trick used in phone phishing is Caller ID spoofing. Caller ID spoofing is the substitution of an alternate Caller ID for the actual phone number from which the caller is placing the call. This can be done for legitimate purposes, such as law enforcement, but is also a way to set the concerns of a target at rest. One can place a call through a website from anywhere in the world and appear to be calling from a financial institution around the corner from the target. The Truth in Caller ID Act of 2010, which by May 2010 had passed the House of Representatives but not yet passed the Senate, would make Caller ID spoofing a crime with some particular exceptions including use by law enforcement and the ability to block one’s own caller ID.

There are some simple steps to avoiding being entrapped by phone phishing. Recall that legitimate businesses will never ask for account information over the phone. Test the veracity of any request for information by calling the organization that any suspicious phone call seems to come using a phone number from published information, such as a billing statement or an account balance record, that you know to be accurate.

Share
WiseGeek is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Mary Elizabeth
By Mary Elizabeth
Passionate about reading, writing, and research, Mary Elizabeth is dedicated to correcting misinformation on the Internet. In addition to writing articles on art, literature, and music for WiseGeek, Mary works as a teacher, composer, and author who has written books, study guides, and teaching materials. Mary has also created music composition content for Sibelius Software. She earned her B.A. from University of Chicago's writing program and an M.A. from the University of Vermont.

Editors' Picks

Discussion Comments
Mary Elizabeth
Mary Elizabeth
Passionate about reading, writing, and research, Mary Elizabeth is dedicated to correcting misinformation on the...
Learn more
Share
https://www.wisegeek.net/what-is-phone-phishing.htm
Copy this link
WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.