Bredy Network Management Corporation Blogs

2 minutes reading time (459 words)

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

What Is SMiShing?
SMiShing is a mobile variant of phishing that involves the use of a text message, rather than an email, to catch the target in the phisher’s net. These attacks are highly reliant on the target’s compliance with the instructions the cybercriminal provides, as well.

These attacks can be more effective than the typical phishing attack, as the general public is increasingly aware of cyber threats--yet don’t expect these threats to manifest in their cell phone.

Just as one would experience in the ‘typical’ phishing attack, a ‘smisher’ will likely try to gain your trust in order to extract credentials. This ultimately allows them access to the accounts they obtained the credentials for, permitting them to wreak havoc and/or steal what they please. This is especially dangerous if they gain access to any client financial information you may have on file. Alternatively, some smishers will claim that if you don’t access a link and enter your personal information, that you will be charged daily for some service. Naturally, if this service is one that your organization has not signed up for, this message should be reported to IT and then disregarded.

How To Spot SMiShing Scams
First, if you suspect that a message is fraudulent, it never hurts to reach out to confirm that the message was sent by who it seems to have been. To do so, reach out via a different channel than your text, such as calling an official service number to speak directly to a representative. This allows you to confirm that the message was legitimate or fraudulent without exposing yourself or the business to greater risk.

In essence, avoid responding to text messages from senders that you don’t know--especially when the number is a 5000 number. This indicates that the message was actually an email sent as a text message, which is often a tactic used by scammers.

Finally, keep an eye out for any messages that contain downloadable apps. These are a favorite method to introduce malware to a mobile device. If an app doesn’t come from an official app store, it is likely a piece of disguised malware.

How To Be The Most Safe
If in doubt, confirm before you answer. Additionally, a VPN (or virtual private network) can help you maintain your mobile security, especially when paired with the practices outlined above.

BNMC can help you to put these safeguards, and others, in place for your business devices. Give us a call at 978-482-2020 to get started.

 

Comments 1

Brayden O'Bryan on Thursday, 12 July 2018 02:56

A new mobile scheme and scam is put online for the success of the candidates. The intrigues of the scam and buy a dissertation online have been improved for the use of the details of the scam for all people and humans in this field.

A new mobile scheme and scam is put online for the success of the candidates. The intrigues of the scam and [url=https://www.bestdissertations.com/buy-dissertation.php]buy a dissertation online[/url] have been improved for the use of the details of the scam for all people and humans in this field.
Already Registered? Login Here
Guest
Monday, July 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Business Computing Internet Software Microsoft Google Computer Hosted Solutions Ransomware Business Mobile Devices Network Security Tech Term Android IT Services Managed IT Services Smartphone Data Management Backup Hardware Windows Small Business IT Support Internet of Things App Business Continuity Cloud Computing Data Windows 10 Cybersecurity Browser Innovation User Tips Server Facebook Business Management Saving Money Artificial Intelligence Gmail Remote Monitoring Encryption Data Recovery Chrome Managed Service Provider Infrastructure Windows 10 Managed IT Services Phishing Tip of the week Efficiency Word Outsourced IT Communication Office 365 Data Backup Productivity Vulnerability Disaster Recovery Money Productivity IT Support Smartphones Settings Applications Robot Google Drive Content Filtering Bandwidth YouTube Upgrade Analytics Antivirus Social Media Risk Management Website communications Government Office Tips Employer-Employee Relationship Microsoft Office Data storage Network Passwords Big Data IT Management Mobile Security WiFi LiFi Vendor Management Data loss Monitors Unified Threat Management Save Money Telephone Systems Hosted Solution Workplace Tips Administration Mouse Automation Two-factor Authentication Maintenance Miscellaneous End of Support Firewall Company Culture Virtual Reality Avoiding Downtime Apple Scam Storage Managing Stress SaaS Wireless Holiday BYOD The Internet of Things VPN Mobile Device Paperless Office Data Security Alert HIPAA Server Management Business Technology VoIP Outlook Virtual Private Network Spam Computing Solar Bring Your Own Device Operating System Managed IT Smart Technology Marketing Assessment Quick Tips Techology Office Samsung Work Budget Statistics Tablet Tech Support Gadgets Smart Tech Social How To Lenovo Downloads Router Voice over Internet Protocol Typing Humor Mail Merge Blockchain Chromebook Cooperation Service Level Agreement Information Technology desktop Compliance Business Intelligence Best Practice Shortcut Distributed Denial of Service Digital Payment Hotspot Internet Exlporer Current Events VoIP Unified Threat Management Social Engineering Disaster IT Technicians Optimization Bluetooth Comparison Websites Users Halloween Digital Connectivity Firefox Superfish Modem FinTech Cryptocurrency Address Permissions Collaboration Staff Leominster Apps Safety Regulations Google Docs Patch Management Managed IT Service Language Value IT solutions Going Green User Error Uninterrupted Power Supply Mirgation Recycling Specifications Scary Stories Document Management Spyware IoT Education Hacks Customer Relationship Management Remote Computing Google Wallet Heating/Cooling Multi-Factor Security Running Cable Computer Care IBM Cookies MSP Bitcoin Network Congestion File Sharing Augmented Reality K-12 Schools Solid State Drive Social Networking Business Growth Break Fix Buisness Computing Infrastructure Professional Services Printing Time Management Printer Chatbots eWaste Legal Search Black Friday Wi-Fi Sports Identity Theft Star Wars Password Networking Writing Virtual Desktop Network upgrade Unified Communications Drones Servers Google Calendar Laptop Training Corporate Profile Nanotechnology Development Windows 8 Emergency Computers Wearable Technology Hard Disk Drive Motherboard Cables Hacker Dark Web Dark Data Automobile Alerts USB Network Management Access Control Dell Identity Continuity Deep Learning Cyber Monday Fraud Cost Management Retail Smart Office Legislation Politics WannaCry Screen Reader Charging Display Cabling SharePoint Cybercrime Wires Alt Codes Microsoft Excel Customer Service Downtime Google Maps Licensing Dongle Touchscreen Web Server what was your? Health Private Cloud IT Budget Mobile Computing GPS Black Market Law Enforcement IT Consultant Cameras Electronic Medical Records Notifications Physical Security Tracking Twitter Meetings Upgrades Gadget Cleaning Emoji Crowdsourcing CCTV Webcam Personal Information Botnet 3D Printing Cortana Error Point of Sale Ben McDonald shares Machine Learning Processors Unsupported Software Virtualization Travel G Suite Update Computer Repair Relocation Supercomputer CrashOverride Mobile Device Management Mobile Data Staffing Motion Sickness How To Work/Life Balance Taxes BDR Recovery Administrator

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3