{"id":2503,"date":"2021-07-01T17:17:19","date_gmt":"2021-07-01T17:17:19","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=2503"},"modified":"2021-07-01T17:17:20","modified_gmt":"2021-07-01T17:17:20","slug":"what-is-vishing-an-up-close-look-at-voice-vishing","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/","title":{"rendered":"What Is Vishing? An Up-Close Look at Voice Vishing"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">If you\u2019ve ever received a phone call about your car\u2019s extended warranty, then you\u2019ve gotten a vishing phone call. A <a href=\"https:\/\/www.businessinsider.com\/why-so-many-spam-robocalls-how-to-stop-them-2021-3\">February 2021 Business Insider survey<\/a> reports that 46% of Americans receive daily spam calls on their cell phones<\/h2>\n\n\n\n<p>What is vishing? The term stands for voice phishing, which is a <a href=\"https:\/\/sectigostore.com\/blog\/common-types-of-phishing-attacks-how-to-recognize-avoid-them\/\">type of phishing<\/a> that bad guys use to scam or trick people into providing sensitive personal or payment information using primarily phone calls and voicemails. It\u2019s all about getting people to trust the caller and believe that they\u2019re doing the right thing by providing that info or doing something they normally wouldn\u2019t.<\/p>\n\n\n\n<p>Vishing is a cybercrime method that, unfortunately, isn\u2019t going out of style anytime soon. In January 2021, the <a href=\"https:\/\/image.communications.cyber.nj.gov\/lib\/fe3e15707564047c7c1270\/m\/2\/FBI+PIN+-+1.14.2021.pdf\">FBI reported<\/a> that cybercriminals used voice phishing phone calls (in combination with a phishing website) to trick employees at several companies into giving up their login credentials.<\/p>\n\n\n\n<p>But what is vishing in a more technical sense? How does vishing work to get you to spill your personal info? We\u2019ll explore several voice phishing methods and will share how to protect yourself and your organization<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is Vishing? A Voice Phishing Definition<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/vishing-phone-call-1024x640.jpg\" alt=\"What is vishing example: A stock image of a worried businessman with a hand over his face\" class=\"wp-image-2518\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/vishing-phone-call-1024x640.jpg 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/vishing-phone-call-300x188.jpg 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/vishing-phone-call-560x350.jpg 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/vishing-phone-call-1536x960.jpg 1536w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/vishing-phone-call-940x588.jpg 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/vishing-phone-call-480x300.jpg 480w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/vishing-phone-call.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>An illustrative stock image of a businessman who receives a voice phishing (vishing) phone call on his cell phone. <\/figcaption><\/figure>\n\n\n\n<p>Vishing is a cybercrime method that involves using phone calls to obtain the personal details of unsuspecting individuals. Sometimes called voice phishing, cybercriminals often use vishing because it\u2019s an effective way to convince their victims to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>disclose their sensitive personal information,<\/li><li>send or otherwise disclose sensitive or confidential company information, and<\/li><li>make fraudulent payments via wire transfers and pre-paid gift card codes.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Vishing Relies on Social Engineering Tactics<\/h3>\n\n\n\n<p>Social engineering is a category of psychological tricks and manipulation tactics that cybercriminals use to get people to do something that normally sends up red flags. It\u2019s about using tactics that get people to ignore the warning signs and ignore their instincts.<\/p>\n\n\n\n<p>Social engineers rely on techniques like using language that conveys urgency or evokes feelings of fear or curiosity to get targets to comply. These tactics often involve a bad guy pretending to be someone in a position of authority, such as a government agent, the target\u2019s bank, or the police. In some cases, the cybercriminal will present themselves as someone who\u2019s likeable, trustworthy, or empathetic to gain a target\u2019s trust.<\/p>\n\n\n\n<p>Once successful at getting what they seek, vishers then use this information to carry out other types of cybercrimes.<\/p>\n\n\n\n<p>In early 2021, the FBI\u2019s Internet Crime Complaint Center (IC3) released their <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\">Internet Crime Report 2020<\/a>, in which they state that social engineering crimes, including vishing, had cost victims more than $54 million.<\/p>\n\n\n\n<p>Now that we can answer the question \u201cwhat is vishing?\u201d Let\u2019s explore some of the different types of voice phishing techniques.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Common Vishing Techniques Cybercriminals Use<\/h2>\n\n\n\n<p>There are several <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/tips\/ST04-014\">vishing techniques<\/a>, but these are the four common ones used by cybercriminals:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SMS Text Messaging<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"384\" height=\"394\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/jailbreaking-an-iphone-voids-warranty.png\" alt=\"An example of a phishing scam about a fake car warranty\" class=\"wp-image-1457\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/jailbreaking-an-iphone-voids-warranty.png 384w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/jailbreaking-an-iphone-voids-warranty-292x300.png 292w\" sizes=\"auto, (max-width: 384px) 100vw, 384px\" \/><\/figure><\/div>\n\n\n\n<p>Some vishing scams start out with a cybercriminal sending text messages to random or targeted phone numbers. They can use apps, websites or even emails to do this. These scam messages contain enticing or threatening messages and phone numbers to convince recipients to call immediately. Once they get the target on the phone, the bad guys can use social engineering to get them to provide personal info or make a payment.&nbsp; &nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Auto-Dialing<\/h3>\n\n\n\n<p>In this approach, cybercriminals use autodialing software and bots to call thousands of numbers, usually within a specific area code, with a pre-recorded message. Think of the common scams relating to your \u201ccar\u2019s extended warranty\u201d or your social security benefits.<\/p>\n\n\n\n<p>They may use this approach to impersonate everyone from government entities to your bank. The recorded message usually says that they have important information to discuss but that the target has to share their personal details to confirm their identities before they can do so. To avoid this type of cyber attacks, check the unknown number via <a href=\"https:\/\/infotracer.com\/phone-lookup\/\">a phone number search tool<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Caller ID &amp; Phone Number Spoofing<\/h3>\n\n\n\n<p>Spoofing is a method of making one thing appear like something different. In the case of vishing phone calls, cybercriminal hide behind fake caller IDs. They may choose to display their caller ID as \u201cUnknown\u201d or may try to impersonate some government authority such as your local police department or federal agents.<\/p>\n\n\n\n<p>But this isn\u2019t the only way bad guys hide who\u2019s really calling. Using voice over IP (VoIP), cybercriminals can easily hide behind false phone numbers. They may choose to use a 1-800 prefix or display legitimate businesses\u2019 phone numbers. They also use <a href=\"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/\">SMS spoofing<\/a> as well to hide the origins of their phony text messages as well.<\/p>\n\n\n\n<p>These tactics make their ruses seem more legitimate in case their targets try searching for the phone number online. &nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Dumpster Diving<\/h3>\n\n\n\n<p>Yes, this approach is exactly what it sounds like but, thankfully, it&#8217;s not as common as other vishing techniques that we&#8217;ve talked about. This process involves cybercriminals literally digging through businesses&#8217; dumpsters to look for documents containing individuals\u2019 and organizations\u2019 sensitive information. They can use this information for pre-texting and as fuel for their social engineering scams to make them more convincing.<\/p>\n\n\n\n<p>Now that we know what vishing is and some of the techniques bad guys use, let\u2019s explore how vishing works and some examples of vishing attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does Vishing Work?<\/h2>\n\n\n\n<p>The way vishing works is that a threat actor reaches out to people using some type of scam to get them to call back and provide some type of sensitive information. (This could be personal information they can use to carry out other crimes or payment info that provides a quick payday.)<\/p>\n\n\n\n<p>They\u2019ll use many different tactics and techniques to try to make contact with potential victims. Most vishing attacks are done via live phone calls and voicemails or by using robocalls. Some vishing calls are combinations of the two methods \u2014 you might receive a robocall that transfers you to a live person when you answer the phone. However, some vishing attacks also involve the use of emails, SMS text messages, or fraudulent websites.<\/p>\n\n\n\n<p>Some vishing attacks involve contacting random victims while others are highly targeted and focus on specific individuals. Vishing attacks target everyone from private individuals to key personnel within different organizations. The approach depends on what the attackers are trying to accomplish and how much time and energy they want to invest in these activities.<\/p>\n\n\n\n<p>For more targeted and convincing vishing attacks, bad guys will carefully plan a lot of specific elements, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>who they choose to impersonate (someone who helps them gain a sense of trust or represents an authority \u2014 a company executive, bank, government representative, etc.).<\/li><li>what contextual information they provide (they want you to believe what they so so that you\u2019ll do what they ask and provide info).<\/li><li>language and words they choose to use (they use urgent or exciting language that evokes emotional responses).<\/li><\/ul>\n\n\n\n<p>Once the bad guys \u201chook\u201d their targets and get the info they seek, they can then use this information to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>drain victims\u2019 bank accounts,<\/li><li>carry out identity theft,<\/li><li>make fraudulent purchases, or<\/li><li>carry out other scams.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Examples of Common Vishing Scams<\/h2>\n\n\n\n<p>The examples below show some of the scams that cybercriminals use to get targets to trust them and do something they shouldn\u2019t.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Government or Law Enforcement Impersonation Scams<\/h3>\n\n\n\n<p>Here, the caller pretends to be a government agency representative such as someone from the FBI, IRS, or Social Security Administration. They may say they need to discuss an important issue with you but first need to verify your identity. If you don\u2019t comply, they\u2019ll start making threats, saying they\u2019ll arrest you or cancel any government benefits you receive.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Medicaid and Medicare Scams<\/h3>\n\n\n\n<p>Nothing is sacred or too sensitive a topic for cybercriminals to not exploit. In these types of vishing scams, threat actors pose as Medicaid or Medicare agents and try to steal the victims\u2019 personal ID numbers or other sensitive information. They may say that they\u2019re mailing out a new benefits card and need to confirm the victim\u2019s identity, or that there\u2019s an issue with the victim\u2019s account and they require the victim\u2019s personal information to resolve it.<\/p>\n\n\n\n<p>Unfortunately, this scam was already popular prior to the COVID-19 pandemic. However, the scam picked up even more during that time as well as when the vaccines started to roll out.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Fake Tech Support Services<\/h3>\n\n\n\n<p>The caller pretends to be a technical support representative from companies like Microsoft, Amazon or Apple. They\u2019ll say they noticed irregularities in your account or discovered malware on your device, but in order to help you fix these issues, they first need you to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>make a payment over the phone to pay for their services.<\/strong> They may ask for your bank account information, credit card number, or even say they require a pre-paid gift card.<\/li><li><strong>go to a specific website where you can log in to view information or download software.<\/strong> This website may be a phishing site that allows them to steal your login credentials or a malicious website that auto-downloads malware onto your device.<\/li><li><strong>provide your email address so they can send you a \u201csoftware update.\u201d<\/strong> This is really a malicious file that infects your device.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Bank or Credit Card Company Impersonation Scams<\/h3>\n\n\n\n<p>This is self-explanatory. It involves the cybercriminal posing as a representative of the victim\u2019s bank or credit card company. The visher requests victims\u2019 bank details to help carry out their bank account management. Once they receive the victim\u2019s banking account details, they use that information to transfer funds from the victim\u2019s bank account to one they control.<\/p>\n\n\n\n<p>They also promise victims enticing credit card rates and limits, luring the victim into falling for their lies and sharing their information as well.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Protect Yourself from Vishing Attacks<\/h2>\n\n\n\n<p>Asides from frequent security awareness training and symposium, here are other ways to protect yourself from vishing attacks:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Never disclose or confirm any personal information over the phone in an unsolicited call.<\/li><li>Register all your cell phone numbers with the \u201cDo Not Call\u201d registry.<\/li><li>Try to have a mobile plan that provides caller ID details.<\/li><li>Use a phone number search tool.<\/li><li>Don\u2019t respond to random emails or SMS text messages directing you to call an unknown number.<\/li><li>Study your caller very well by paying attention to every detail of the conversation. If they ask for personal information or something about the call seems suspicious, then follow the next tip mentioned below.<\/li><li>If unsure of the caller\u2019s legitimacy, hang up and call the organization they claim to represent back using an official phone number.<\/li><li>If someone calls claiming they\u2019re a company executive and makes an unusual or urgent request, inform them you\u2019re hanging up and will call back on an official line to confirm these details.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Vishing becomes <a href=\"https:\/\/archives.fbi.gov\/archives\/news\/testimony\/the-fbis-perspective-on-the-cybercrime-problem\">difficult for cybercriminals<\/a> when individuals are properly enlightened on different types of vishing attacks, the standard techniques cybercriminals use, and how to effectively protect themselves against possible vishing attacks. Although this article adequately explains these tenets, a good read makes you immune to vishing attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve ever received a phone call about your car\u2019s extended warranty, then you\u2019ve gotten a vishing phone call. A February 2021 Business Insider survey reports that 46% of Americans&#8230;<\/p>\n","protected":false},"author":21,"featured_media":2516,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","tve_updated_post":"","tve_custom_css":"","tve_user_custom_css":"","tve_globals":{},"tcb2_ready":0,"tcb_editor_enabled":0,"tve_landing_page":"","_tve_header":"","_tve_footer":""},"categories":[13],"tags":[200],"class_list":["post-2503","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-vishing","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is Vishing? An Up-Close Look at Voice Vishing - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"What is vishing? Voice phishing is a way for cybercriminals to get their hands on your personal or company&#039;s sensitive info using phone calls.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Vishing? An Up-Close Look at Voice Vishing - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"What is vishing? Voice phishing is a way for cybercriminals to get their hands on your personal or company&#039;s sensitive info using phone calls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-01T17:17:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-01T17:17:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/what-is-vishing-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Hartwig\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Hartwig\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-vishing-an-up-close-look-at-voice-vishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-vishing-an-up-close-look-at-voice-vishing\\\/\"},\"author\":{\"name\":\"Ben Hartwig\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3d3c96d00e6563f95c037b59f84bf10\"},\"headline\":\"What Is Vishing? An Up-Close Look at Voice Vishing\",\"datePublished\":\"2021-07-01T17:17:19+00:00\",\"dateModified\":\"2021-07-01T17:17:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-vishing-an-up-close-look-at-voice-vishing\\\/\"},\"wordCount\":1885,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-vishing-an-up-close-look-at-voice-vishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/what-is-vishing-feature.jpg\",\"keywords\":[\"vishing\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-vishing-an-up-close-look-at-voice-vishing\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-vishing-an-up-close-look-at-voice-vishing\\\/\",\"name\":\"What Is Vishing? An Up-Close Look at Voice Vishing - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-vishing-an-up-close-look-at-voice-vishing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-vishing-an-up-close-look-at-voice-vishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/what-is-vishing-feature.jpg\",\"datePublished\":\"2021-07-01T17:17:19+00:00\",\"dateModified\":\"2021-07-01T17:17:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3d3c96d00e6563f95c037b59f84bf10\"},\"description\":\"What is vishing? Voice phishing is a way for cybercriminals to get their hands on your personal or company's sensitive info using phone calls.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-vishing-an-up-close-look-at-voice-vishing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-vishing-an-up-close-look-at-voice-vishing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-vishing-an-up-close-look-at-voice-vishing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/what-is-vishing-feature.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/what-is-vishing-feature.jpg\",\"width\":1600,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-vishing-an-up-close-look-at-voice-vishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Vishing? An Up-Close Look at Voice Vishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3d3c96d00e6563f95c037b59f84bf10\",\"name\":\"Ben Hartwig\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e159a6b64240a932d27d65fd9d8dd6433a414c0338359682db8162a7559b6519?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e159a6b64240a932d27d65fd9d8dd6433a414c0338359682db8162a7559b6519?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e159a6b64240a932d27d65fd9d8dd6433a414c0338359682db8162a7559b6519?s=96&d=mm&r=g\",\"caption\":\"Ben Hartwig\"},\"description\":\"Ben is a Web Operations Executive at InfoTracer who takes a wide view of the whole system. He authors guides on entire security posture, both physical and cyber. Enjoys sharing the best practices and does it the right way!\",\"sameAs\":[\"http:\\\/\\\/infotracer.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Vishing? An Up-Close Look at Voice Vishing - InfoSec Insights","description":"What is vishing? Voice phishing is a way for cybercriminals to get their hands on your personal or company's sensitive info using phone calls.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/","og_locale":"en_US","og_type":"article","og_title":"What Is Vishing? An Up-Close Look at Voice Vishing - InfoSec Insights","og_description":"What is vishing? Voice phishing is a way for cybercriminals to get their hands on your personal or company's sensitive info using phone calls.","og_url":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/","og_site_name":"InfoSec Insights","article_published_time":"2021-07-01T17:17:19+00:00","article_modified_time":"2021-07-01T17:17:20+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/what-is-vishing-feature.jpg","type":"image\/jpeg"}],"author":"Ben Hartwig","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ben Hartwig","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/"},"author":{"name":"Ben Hartwig","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/e3d3c96d00e6563f95c037b59f84bf10"},"headline":"What Is Vishing? An Up-Close Look at Voice Vishing","datePublished":"2021-07-01T17:17:19+00:00","dateModified":"2021-07-01T17:17:20+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/"},"wordCount":1885,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/what-is-vishing-feature.jpg","keywords":["vishing"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/","url":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/","name":"What Is Vishing? An Up-Close Look at Voice Vishing - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/what-is-vishing-feature.jpg","datePublished":"2021-07-01T17:17:19+00:00","dateModified":"2021-07-01T17:17:20+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/e3d3c96d00e6563f95c037b59f84bf10"},"description":"What is vishing? Voice phishing is a way for cybercriminals to get their hands on your personal or company's sensitive info using phone calls.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/what-is-vishing-feature.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/07\/what-is-vishing-feature.jpg","width":1600,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-vishing-an-up-close-look-at-voice-vishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is Vishing? An Up-Close Look at Voice Vishing"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/e3d3c96d00e6563f95c037b59f84bf10","name":"Ben Hartwig","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e159a6b64240a932d27d65fd9d8dd6433a414c0338359682db8162a7559b6519?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e159a6b64240a932d27d65fd9d8dd6433a414c0338359682db8162a7559b6519?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e159a6b64240a932d27d65fd9d8dd6433a414c0338359682db8162a7559b6519?s=96&d=mm&r=g","caption":"Ben Hartwig"},"description":"Ben is a Web Operations Executive at InfoTracer who takes a wide view of the whole system. He authors guides on entire security posture, both physical and cyber. Enjoys sharing the best practices and does it the right way!","sameAs":["http:\/\/infotracer.com"]}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=2503"}],"version-history":[{"count":0,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2503\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/2516"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=2503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=2503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=2503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}