Market Cap: $2.992T 3.920%
Volume(24h): $117.4825B -24.560%
  • Market Cap: $2.992T 3.920%
  • Volume(24h): $117.4825B -24.560%
  • Fear & Greed Index:
  • Market Cap: $2.992T 3.920%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$87613.404469 USD

4.63%

ethereum
ethereum

$2199.448962 USD

5.05%

tether
tether

$1.000039 USD

0.06%

xrp
xrp

$2.448336 USD

5.48%

bnb
bnb

$592.875082 USD

5.13%

solana
solana

$143.687490 USD

5.14%

usd-coin
usd-coin

$0.999847 USD

0.01%

cardano
cardano

$0.938697 USD

16.07%

dogecoin
dogecoin

$0.199883 USD

3.86%

tron
tron

$0.242057 USD

4.19%

pi
pi

$1.910603 USD

7.23%

hedera
hedera

$0.254949 USD

12.68%

chainlink
chainlink

$15.229514 USD

9.35%

unus-sed-leo
unus-sed-leo

$9.905577 USD

-0.33%

stellar
stellar

$0.297440 USD

4.97%

Cryptocurrency News Articles

Many of us have families to look after.

Mar 05, 2025 at 11:02 pm

We save money not only for our own future but also – perhaps even more so – for our kids and grandkids.

Many of us have families to look after.

Many of us have families to look after. We save money not only for our own future but also – perhaps even more so – for our kids and grandkids. We want to secure a good education, help them buy a home or simply set aside something for when they need it.

So did Tony. He’d saved a substantial amount for his sons' future, more than $4 million in bitcoin. And with just one click, he lost it all to vishing, a type of scam that uses phone calls to trick people into giving up sensitive information.

Scammers posed as Google Support agents and, after an elaborate scheme, first caught his attention, then gained his trust and ultimately left him with nothing.

"Please, man. Is there anything you can do to give me something back?" was Tony’s final, desperate plea to the scammers, hoping to appeal to their humanity.

GET EXPERT SECURITY ALERTS, MUST-KNOW TECH TIPS AND THE LATEST DIGITAL TRENDS STRAIGHT TO YOUR INBOX. SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

A man typing on his computer keyboard (Kurt "CyberGuy" Knutsson)

What is vishing?

Vishing, short for "voice phishing," is a type of cybercrime that uses phone calls to deceive individuals into revealing personal or financial information. Unlike traditional phishing, which relies on emails or text messages, vishing leverages the power of human voice and social engineering to manipulate victims. Scammers often impersonate legitimate organizations, such as banks, tech companies, or government agencies, to gain trust and create a sense of urgency. They may ask for passwords, credit card numbers, or other sensitive details, which they then use for fraudulent purposes.

Because vishing relies heavily on social engineering tactics, it can be difficult to detect, making it a particularly dangerous form of cybercrime.

Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

The scam is a well-orchestrated play

Let's break down these vishing schemes to understand why they are so effective. Once you see them as a staged play consisting of different acts, it becomes easier to recognize the individual tactics.

Act 1: The setup and targeting

Scammers start by identifying potential victims through social media, public transaction records, leaked databases, and more. Once they select a target, they gather personal details (email, phone number, financial holdings) to build credibility. And you could easily be a target. That’s because data brokers – companies that buy and sell your personal information – are goldmines for scammers. Your entire profile is likely out there, containing everything they need to run a successful scam: your name, address, contact details, family members, owned properties and more.

How to protect yourself at this stage:

Act 2: The first contact

Scammers always initiate contact first. Let’s walk through a vishing scam using a Google account as an example.

Google verification code text (Kurt "CyberGuy" Knutsson)

Fake Google form (Kurt "CyberGuy" Knutsson)

How to protect yourself at this stage:

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Act 3: Building trust

Scammers no longer ask for passwords outright. That trick doesn’t work anymore. Here's what they do instead.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Illustration of username and password credential page (Kurt "CyberGuy" Knutsson)

Act 4: The scam

After you successfully reset your password, scammers ask for one final step: log in. This is where the real scam happens.

How to protect yourself at this stage:

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

Act 5: The heist

At this stage, the scammers end the call, leaving you feeling at ease. You won’t realize what happened until it’s too late. And it’s not just Google accounts at risk. The same method can be used to access Apple accounts, banking services and cryptocurrency wallets. For some, losing access to Google alone is devastating; after all, Google Drive, Google Photos and other cloud services store vast amounts of personal and financial data. But by the time you realize what’s happened, it’s already too late.

How to protect yourself at this stage:

While securing your accounts and reporting fraud are crucial after a scam has already occurred, the best defense is preventing these attacks in the first place. Taking these steps can help ensure you don’t fall victim to a vishing scam in the first place.

How to protect yourself from vishing scams

1. Invest in personal data removal services: These scams all have one thing in common: they need some of your personal info to work. Without your name, phone number or email, these scams can't happen. Scammers

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Mar 06, 2025