Talk:Voice phishing/Archives/2013

Latest comment: 15 years ago by Alastair Rae in topic Example


Merge with phishing

Vishing and Phishing *can* happen independently, however a recent trend uses text only email messages (text only since consumers have been taught to avoid links and pictures in email) with a scary call to action referencing a VOIP #. So...I think that a comment should be added to both Vishing as well as Phishing explaining that the two can be bundled.

No. Though they are both similar as they are social engineering scams, the attacks are performed in two completely separate manners. A person need not have a computer to be a victim of vishing as a victim of phising would. Social engineering should have a brief description of vishing and phising with each technique having its own page. --I already forgot 21:18, 20 September 2006 (UTC)

I have to agree with 'I already forgot'. Phishing may be used as part of a vishing attack, but ultimately they are seperate topics. --Dan 9:55, 21 September 2006

This attack vector is unique though it can involve phishing as one of its variables. A better idea would be to create a social engineering category and place both of them under that. That said, standing alone as they are now is also fine.--SG

Agree with others to keep them seperate. Although it is interesting that although phishing refers to the use of computers to trick people, the "PH" in phishing is misleading since PH is for computers but "V" in vishing refers to Phones. One would logically think that PHishing is PHone-related.


Agree with the pack - keep it as a unique entry. The Phishing entry is so very long that Vishing will be swallowed and lost.

Agree keep as unique. Shabda 13:32, 27 July 2007 (UTC)

Discrepancy

"The phone number could be a toll free number often with a spoofed caller ID for the financial company they are pretending to represent."

"When the consumer calls the number, it is answered by a typical computer generated voice that tells the consumer they have reached account verification and instructs the consumer to enter their 16-digit credit card number on the key pad."

If the consumer calls the number, and the number is the phone number of the financial company - How does the attacker capture the 16 digit credit-card number? —The preceding unsigned comment was added by 67.115.118.5 (talk) 16:30, 19 January 2007 (UTC).

Orphan

I removed the orphan tag as I can see a number of articles linking to here.

Example

In the given example the victim is required to call back. Why is that step necessary? Why can't the scammer just ask for cards details on the first call? I beleive that's what happens in this case (slashdot)--Alastair Rae (talk) 09:45, 29 October 2009 (UTC)