{"id":25270,"date":"2024-10-14T12:42:00","date_gmt":"2024-10-14T20:42:00","guid":{"rendered":"https:\/\/www.spokeo.com\/compass\/?p=25270"},"modified":"2024-10-15T08:27:18","modified_gmt":"2024-10-15T16:27:18","slug":"protect-yourself-from-vishing-attacks","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/","title":{"rendered":"What is Vishing? Here\u2019s What You Need to Know"},"content":{"rendered":"\n<p>The written word carries a certain weight.&nbsp; A paper letter is quite official-looking, especially now that they\u2019re relatively rare, and even an email can feel pretty formal.&nbsp; That\u2019s why scammers often use emails to carry out phishing attacks:&nbsp; The gravitas of the written word can help create an air of legitimacy and mask any errors in the email\u2019s actual language.<\/p>\n\n\n\n<p>Phone calls typically feel more casual, but scammers can still use them for phishing attacks.&nbsp; The informal feeling of a phone call can help skilled con artists sidestep your mental defenses and result in a successful attack.&nbsp; This approach is called \u201cvishing,\u201d and it\u2019s a danger you need to be aware of.<\/p>\n\n\n\n<p>What is Vishing?&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is \u201cVishing\u201d?&nbsp;<\/h2>\n\n\n\n<p>The term <em>vishing<\/em> is a mashup of <em>voice<\/em> and <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>phishing<\/em><\/a>, which summarizes the concept pretty neatly.\u00a0 Like any other phishing attack, it\u2019s an attempt at bamboozling you, and creating a vulnerability that can be exploited for gain.\u00a0\u00a0<\/p>\n\n\n\n<p>All vishing calls are <a href=\"https:\/\/www.spokeo.com\/compass\/the-5-most-common-phone-scams-of-2019\/\" target=\"_blank\" rel=\"noreferrer noopener\">phone scams<\/a>, but not all phone scams are vishing.\u00a0 The line between them is a fine one, but it\u2019s distinct.\u00a0 A straight-up scam attempts to trick you into coughing up some cash, through intimidation (\u201cI\u2019m from the IRS, and you owe us money!\u201d) or an appeal to greed (\u201cYou\u2019ve won our sweepstakes! There\u2019s just this processing fee\u2026\u201d).<\/p>\n\n\n\n<p>Vishing plays a longer game.&nbsp; The con artists may attempt to coax crucial personal information from you, such as your SSN, account passwords, and PINs, or they may helpfully walk you through the process of downloading and installing malware on your computer.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The real damage happens after they\u2019re successful.\u00a0 They can use the information you\u2019ve given them to loot your accounts, steal your identity, and target your friends, family, and colleagues with impersonation scams.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Most Common Types of Vishing Calls<\/h2>\n\n\n\n<p>Vishing attacks can take a number of different forms.&nbsp; These include\u2026<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The \u201cPotential Fraud\u201d Call<\/h3>\n\n\n\n<p>You receive a call that appears to come from a number legitimately belonging to your bank or credit card company (faking a legitimate number is called \u201c<a href=\"https:\/\/www.spokeo.com\/compass\/who-is-calling-me-how-to-spot-voice-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">spoofing<\/a>,\u201d and it\u2019s pretty easy).\u00a0 A pleasant, professional-sounding person tells you there have been suspicious purchases on your account, and \u2014 if you take the bait \u2014 will talk you through verifying your identity and taking the information necessary to send out a new card.\u00a0 <a href=\"https:\/\/krebsonsecurity.com\/2018\/10\/voice-phishing-scams-are-getting-more-clever\/comment-page-4\/\" target=\"_blank\" rel=\"noreferrer noopener\">This is bogus<\/a>, of course, and the information you give will give them access to your accounts and much of what they need to steal your identity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Customer Service Calls<\/h3>\n\n\n\n<p>The attack might take the form of an email purporting to come from Amazon or a streaming service you use or the publishers of one of the apps on your phone.&nbsp; The pitch is that \u201cthere\u2019s a problem with your order\/account\/app, so please call us toll-free to sort it out.\u201d&nbsp; When you do, you\u2019ll be deftly prompted to give up your account information or \u2014 in some cases \u2014 install malware or ransomware on your devices.<\/p>\n\n\n\n<p>Robocalls can be used in the same way to initiate contact: A recorded message asks you to call a given number to sort out the problem with your account, and if you do, you\u2019ll be speaking with the scammer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">IRS and SSA Calls<\/h3>\n\n\n\n<p>These can be either vishing or straight-up fraud, depending on their approach.&nbsp; In the case of vishing calls, they\u2019ll tell you there\u2019s an issue with your account that needs to be resolved (or potentially that they\u2019ve corrected an error that means a balance in your favor) and that they need to verify your details.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Call from Work<\/h3>\n\n\n\n<p>This one took on a whole new life during the pandemic as working from home became common.\u00a0 The caller claims to be a coworker, and either has misplaced his login information or plays the harried IT guy trying to sort out a snafu with everyone\u2019s credentials.\u00a0 If you give him yours, you\u2019ve potentially made your whole company (<a href=\"https:\/\/www.csoonline.com\/article\/3191947\/supply-chain-attacks-show-why-you-should-be-wary-of-third-party-providers.html\" target=\"_blank\" rel=\"noreferrer noopener\">and its clients!<\/a>) vulnerable.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Phishing\/Vishing Combo<\/h3>\n\n\n\n<p>Some clever attacks <a href=\"https:\/\/www.armorblox.com\/blog\/amazon-vishing-voice-phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">combine phishing and vishing<\/a> for maximum effect.\u00a0 A conventional phishing attack might include a link to a dubious site or an attachment with a malware \u201cpayload\u201d that installs if you download it.\u00a0 Email providers have algorithms to detect and block those, but a phone number flies beneath their radar.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5935792.jpg?resize=1024%2C683&#038;ssl=1\" alt=\"vishing scammer planning attack\" class=\"wp-image-27634\" srcset=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5935792-scaled.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5935792-scaled.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5935792-scaled.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5935792-scaled.jpg?resize=1536%2C1024&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5935792-scaled.jpg?resize=2048%2C1365&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5935792-scaled.jpg?resize=1920%2C1280&amp;ssl=1 1920w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5935792-scaled.jpg?resize=1170%2C780&amp;ssl=1 1170w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5935792-scaled.jpg?resize=585%2C390&amp;ssl=1 585w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5935792-scaled.jpg?resize=263%2C175&amp;ssl=1 263w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5935792-scaled.jpg?resize=1320%2C880&amp;ssl=1 1320w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-sora-shimazaki-5935792-scaled.jpg?w=2340&amp;ssl=1 2340w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How to Protect Yourself from Vishing Attacks<\/h2>\n\n\n\n<p>A well-planned vishing call is a pretty persuasive thing:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The person at the other end of the line will typically be polite and courteous, and sound very professional.\u00a0\u00a0<\/li>\n\n\n\n<li>The <a href=\"https:\/\/www.spokeo.com\/compass\/identify-99-phone-scams\/\" target=\"_blank\" rel=\"noreferrer noopener\">biggest giveaway<\/a> is that you\u2019ll always face pressure to act now, from fear or greed (which, in its way, is just fear of missing out).\u00a0 That pressure prevents you from asking yourself obvious questions, like \u201cwhy is this person asking for my PIN,\u201d or \u201cwhy is Craigslist suddenly verifying phone numbers?\u201d\u00a0 Your bank and government agencies like the SSA, IRS, or Medicare \u2014 to pick three major examples \u2014 just don\u2019t work that way.<\/li>\n<\/ul>\n\n\n\n<p>Your best protection against vishing calls is simply a healthy level of skepticism.&nbsp; If you receive a plausible-sounding call, don\u2019t engage with the caller.&nbsp; Just hang up and call back the corresponding company or government office directly from their listed number.&nbsp; In the unlikely event that the call was legitimate, you\u2019ll be connected to the correct department quickly enough.<\/p>\n\n\n\n<p>You can also take more active steps to protect yourself, such as:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Searching your own phone number with Spokeo\u2019s <a href=\"https:\/\/www.spokeo.com\/reverse-phone-lookup\" target=\"_blank\" rel=\"noreferrer noopener\">Reverse Phone Lookup<\/a>.\u00a0 If a name other than yours is associated with your number, it may be cause for concern (we\u2019ll circle back to that in a minute).\u00a0\u00a0<\/li>\n\n\n\n<li>Signing up for Spokeo\u2019s identity protection service, <a href=\"https:\/\/www.spokeo.com\/identity-theft-protection\" target=\"_blank\" rel=\"noreferrer noopener\">Spokeo Protect<\/a>, which includes \u201cdark web\u201d monitoring that will alert you when your personal information is bought and sold on the web\u2019s seamy underbelly.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The Google Voice Scam Is an Unusual Vishing Attack<\/h2>\n\n\n\n<p>In one oddball variant that\u2019s worth mentioning, the vishing scheme\u2019s target is\u2026your phone number.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Why?&nbsp; Because it gives the scammers opportunities to target people with seemingly local calls (\u201cYou don\u2019t know me, but our kids go to the same school\u2026\u201d), or to use your phone number in targeted phishing or fraud campaigns against your friends, family or coworkers.<\/p>\n\n\n\n<p>First, the scammer finds your phone number somewhere it\u2019s been posted publicly (often a Craigslist ad).\u00a0 Then they call, claiming to be from that site, and telling you they\u2019ve <a href=\"https:\/\/www.auslogics.com\/en\/articles\/protect-from-google-voice-scam\/\" target=\"_blank\" rel=\"noreferrer noopener\">sent a verification code<\/a> to the phone number you listed.\u00a0 You\u2019re asked to enter that code to verify your phone number.  What\u2019s really going on is that the scammers have created <a href=\"https:\/\/voice.google.com\/u\/0\/signup\" target=\"_blank\" rel=\"noreferrer noopener\">a Google Voice account<\/a> using your number, and the verification code has come from Google.\u00a0 When you pass it along to the scammer, they\u2019re now able to make calls from Google Voice that will show your number.\u00a0 The outcome might be a phishing call to your workplace or a \u201cfamily emergency\u201d call to an elderly and confused relative, asking for a loan to help you out.\u00a0 Often, unless the scammer does target your family, you\u2019ll never know what has happened.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"681\" src=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/john-tuesday-8c6iJMh80BI-unsplash.jpg?resize=1024%2C681&#038;ssl=1\" alt=\"woman declining vishing phone call\" class=\"wp-image-27637\" srcset=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/john-tuesday-8c6iJMh80BI-unsplash.jpg?resize=1024%2C681&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/john-tuesday-8c6iJMh80BI-unsplash.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/john-tuesday-8c6iJMh80BI-unsplash.jpg?resize=768%2C511&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/john-tuesday-8c6iJMh80BI-unsplash.jpg?resize=1536%2C1022&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/john-tuesday-8c6iJMh80BI-unsplash.jpg?resize=1170%2C778&amp;ssl=1 1170w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/john-tuesday-8c6iJMh80BI-unsplash.jpg?resize=585%2C389&amp;ssl=1 585w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/john-tuesday-8c6iJMh80BI-unsplash.jpg?resize=263%2C175&amp;ssl=1 263w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/john-tuesday-8c6iJMh80BI-unsplash.jpg?resize=1320%2C878&amp;ssl=1 1320w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/john-tuesday-8c6iJMh80BI-unsplash.jpg?w=1920&amp;ssl=1 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">AI-Powered Vishing Is an Emerging Threat<\/h2>\n\n\n\n<p>One of the silver linings to vishing is that it requires a scammer speaking to you one-on-one and therefore is a relatively \u201cartisanal\u201d form of fraud.&nbsp; Unfortunately, that\u2019s changing rapidly.&nbsp; Some scammers operate full-scale call centers, just as legitimate companies do, and have a number of operators to make or receive calls, but a bigger danger comes from technology.<\/p>\n\n\n\n<p>Digital assistants (Siri, Alexa) and those software \u201cvoice agents\u201d you hear when you call some companies are getting better all the time, and new, <a href=\"https:\/\/www.geekwire.com\/2018\/google-duplex-technology-mimics-human-voices-raising-new-privacy-security-concerns\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI-driven technologies<\/a> like Google Duplex can imitate a human pretty well.\u00a0 Some scammers have begun using this kind of technology in their vishing calls, with an interactive bot delivering the main pitch and then referring you to a human \u201csupervisor\u201d if you ask a question that takes them off-script.<\/p>\n\n\n\n<p>AI-driven software can now even take a small sample of your voice (say, the message from your voicemail) and imitate it, in a sort of audible \u201cdeep fake.\u201d\u00a0 As that technology inevitably migrates further into the criminal underworld, the <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/10\/14\/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions\/?sh=552995407559\" target=\"_blank\" rel=\"noreferrer noopener\">potential for misuse<\/a> is huge.\u00a0 If scammers successfully add your number to their Google Voice account, and match that with your voice, they can impersonate you to friends, <a href=\"https:\/\/arstechnica.com\/tech-policy\/2023\/03\/rising-scams-use-ai-to-mimic-voices-of-loved-ones-in-financial-distress\/\" target=\"_blank\" rel=\"noreferrer noopener\">family<\/a>, or anyone you do business with.\u00a0 More to the point, they can do it en masse to thousands of people at once\u2026a thought that should send chills down your spine.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Be Privacy-Minded, to Nip Fraud in the Bud<\/h2>\n\n\n\n<p>Since vishing typically relies on having some of your personal information, simply restricting the information you put out there is the most proactive measure you can take.\u00a0 The sum total of your online activity is your \u201c<a href=\"https:\/\/www.spokeo.com\/compass\/how-to-protect-your-digital-footprint\/\" target=\"_blank\" rel=\"noreferrer noopener\">digital footprint<\/a>,\u201d and <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-protect-your-digital-footprint\/\" target=\"_blank\" rel=\"noreferrer noopener\">keeping it to a minimum<\/a> is very much in your interest.\u00a0 Shut down old accounts, bump up the <a href=\"https:\/\/www.spokeo.com\/compass\/internet-safety-what-you-need-to-know-about-public-vs-private-social-media-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener\">privacy settings<\/a> on your social media accounts, and \u2014 in general \u2014 don\u2019t share your personal information in public spaces.<\/p>\n\n\n\n<p>Taking those basic precautions can go a long way toward making your online life safer, and in turn, insulating you from vishing and other forms of criminality.&nbsp; Remember, criminals are always looking for the easy target (if they wanted to work hard, they\u2019d have real jobs). If you\u2019re not one of those easy targets, they&#8217;ll usually overlook you.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sources<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Krebs on Security:<a href=\"https:\/\/krebsonsecurity.com\/2018\/10\/voice-phishing-scams-are-getting-more-clever\/comment-page-4\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Voice Phishing Scams are Getting More Clever<\/a><\/li>\n\n\n\n<li>CSO Online:<a href=\"https:\/\/www.csoonline.com\/article\/3191947\/supply-chain-attacks-show-why-you-should-be-wary-of-third-party-providers.html\" target=\"_blank\" rel=\"noreferrer noopener\"> Supply Chain Attacks Show Why You Should be Wary of Third-Party Providers<\/a><\/li>\n\n\n\n<li>ArmorBlox:<a href=\"https:\/\/www.armorblox.com\/blog\/amazon-vishing-voice-phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Hello, Is it Me You\u2019re Phishing For: Amazon Vishing Attacks<\/a><\/li>\n\n\n\n<li>Auslogics:<a href=\"https:\/\/www.auslogics.com\/en\/articles\/protect-from-google-voice-scam\/\" target=\"_blank\" rel=\"noreferrer noopener\"> How to Stay Safe From the Google Voice Scam?<\/a><\/li>\n\n\n\n<li>Geekwire:<a href=\"https:\/\/www.geekwire.com\/2018\/google-duplex-technology-mimics-human-voices-raising-new-privacy-security-concerns\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Grappling with Google Duplex: What Happens When our AI Assistants Suddenly Seem More Human<\/a><\/li>\n\n\n\n<li>Forbes: <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/10\/14\/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions\/?sh=552995407559\" target=\"_blank\" rel=\"noreferrer noopener\">Fraudsters Cloned Company Director\u2019s Voice in $35 Million Heist, Police Find<\/a><\/li>\n\n\n\n<li>Ars Technica: <a href=\"https:\/\/arstechnica.com\/tech-policy\/2023\/03\/rising-scams-use-ai-to-mimic-voices-of-loved-ones-in-financial-distress\/\" target=\"_blank\" rel=\"noreferrer noopener\">Thousands Scammed by AI Voices Mimicking Loved Ones in Emergencies<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>What is vishing? Learn how these \u201cvoice phishing\u201d attacks work, how to recognize them when you hear them, and how to prevent them. <\/p>\n","protected":false},"author":112,"featured_media":25271,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[612,614],"tags":[],"class_list":["post-25270","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides","category-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Vishing? Here\u2019s What You Need to Know | Spokeo<\/title>\n<meta name=\"description\" content=\"What is vishing? Learn how these \u201cvoice phishing\u201d attacks work, how to recognize them when you hear them, and how to prevent them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Vishing? Here\u2019s What You Need to Know | Spokeo\" \/>\n<meta property=\"og:description\" content=\"What is vishing? Learn how these \u201cvoice phishing\u201d attacks work, how to recognize them when you hear them, and how to prevent them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Spokeo\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-14T20:42:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-15T16:27:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spokeo.com\/compass\/image\/HowToProtectYourselfFromGoogleVoiceScamsAndOtherVishingAttacks_1170x600.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fred Decker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:site\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fred Decker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/\",\"url\":\"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/\",\"name\":\"What Is Vishing? Here\u2019s What You Need to Know | Spokeo\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/HowToProtectYourselfFromGoogleVoiceScamsAndOtherVishingAttacks_1170x600.jpg?fit=1170%2C600&ssl=1\",\"datePublished\":\"2024-10-14T20:42:00+00:00\",\"dateModified\":\"2024-10-15T16:27:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\"},\"description\":\"What is vishing? Learn how these \u201cvoice phishing\u201d attacks work, how to recognize them when you hear them, and how to prevent them.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/HowToProtectYourselfFromGoogleVoiceScamsAndOtherVishingAttacks_1170x600.jpg?fit=1170%2C600&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/HowToProtectYourselfFromGoogleVoiceScamsAndOtherVishingAttacks_1170x600.jpg?fit=1170%2C600&ssl=1\",\"width\":1170,\"height\":600,\"caption\":\"Google voice scams\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\",\"url\":\"https:\/\/www.spokeo.com\/compass\/\",\"name\":\"The Compass Blog | Digital Identity and People Search | Spokeo\",\"description\":\"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\",\"name\":\"Fred Decker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"caption\":\"Fred Decker\"},\"url\":\"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Vishing? Here\u2019s What You Need to Know | Spokeo","description":"What is vishing? Learn how these \u201cvoice phishing\u201d attacks work, how to recognize them when you hear them, and how to prevent them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/","og_locale":"en_US","og_type":"article","og_title":"What Is Vishing? Here\u2019s What You Need to Know | Spokeo","og_description":"What is vishing? Learn how these \u201cvoice phishing\u201d attacks work, how to recognize them when you hear them, and how to prevent them.","og_url":"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/","og_site_name":"The Compass Blog | Digital Identity and People Search | Spokeo","article_publisher":"https:\/\/www.facebook.com\/Spokeo\/","article_published_time":"2024-10-14T20:42:00+00:00","article_modified_time":"2024-10-15T16:27:18+00:00","og_image":[{"width":1170,"height":600,"url":"https:\/\/www.spokeo.com\/compass\/image\/HowToProtectYourselfFromGoogleVoiceScamsAndOtherVishingAttacks_1170x600.jpg","type":"image\/jpeg"}],"author":"Fred Decker","twitter_card":"summary_large_image","twitter_creator":"@Spokeo","twitter_site":"@Spokeo","twitter_misc":{"Written by":"Fred Decker","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/","url":"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/","name":"What Is Vishing? Here\u2019s What You Need to Know | Spokeo","isPartOf":{"@id":"https:\/\/www.spokeo.com\/compass\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/HowToProtectYourselfFromGoogleVoiceScamsAndOtherVishingAttacks_1170x600.jpg?fit=1170%2C600&ssl=1","datePublished":"2024-10-14T20:42:00+00:00","dateModified":"2024-10-15T16:27:18+00:00","author":{"@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea"},"description":"What is vishing? Learn how these \u201cvoice phishing\u201d attacks work, how to recognize them when you hear them, and how to prevent them.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/protect-yourself-from-vishing-attacks\/#primaryimage","url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/HowToProtectYourselfFromGoogleVoiceScamsAndOtherVishingAttacks_1170x600.jpg?fit=1170%2C600&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/HowToProtectYourselfFromGoogleVoiceScamsAndOtherVishingAttacks_1170x600.jpg?fit=1170%2C600&ssl=1","width":1170,"height":600,"caption":"Google voice scams"},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/compass\/#website","url":"https:\/\/www.spokeo.com\/compass\/","name":"The Compass Blog | Digital Identity and People Search | Spokeo","description":"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea","name":"Fred Decker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","caption":"Fred Decker"},"url":"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/HowToProtectYourselfFromGoogleVoiceScamsAndOtherVishingAttacks_1170x600.jpg?fit=1170%2C600&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8V62u-6zA","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/comments?post=25270"}],"version-history":[{"count":2,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25270\/revisions"}],"predecessor-version":[{"id":27638,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25270\/revisions\/27638"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media\/25271"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media?parent=25270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/categories?post=25270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/tags?post=25270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}