![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
我們不僅為自己的未來省錢,而且為我們的孩子和孫子孫女省錢。
Many of us have families to look after. We save money not only for our own future but also – perhaps even more so – for our kids and grandkids. We want to secure a good education, help them buy a home or simply set aside something for when they need it.
我們中的許多人都有家人要照顧。我們不僅為自己的未來省錢,而且為我們的孩子和孫子孫女省錢。我們希望獲得良好的教育,幫助他們購買房屋或在需要時為他們留出一些東西。
So did Tony. He’d saved a substantial amount for his sons' future, more than $4 million in bitcoin. And with just one click, he lost it all to vishing, a type of scam that uses phone calls to trick people into giving up sensitive information.
托尼也是如此。他為兒子的未來節省了大量資金,比特幣超過400萬美元。只需單擊一下,他就把所有這些都丟給了葡萄酒,這是一種使用電話來欺騙人們放棄敏感信息的騙局。
Scammers posed as Google Support agents and, after an elaborate scheme, first caught his attention, then gained his trust and ultimately left him with nothing.
騙子扮演Google支持代理商,經過精心製定的計劃,首先引起了他的注意,然後獲得了信任,最終一無所有。
"Please, man. Is there anything you can do to give me something back?" was Tony’s final, desperate plea to the scammers, hoping to appeal to their humanity.
“拜託,伙計。你有什麼可以給我回去的東西嗎?”是托尼對騙子的最後一場拼命的懇求,希望能吸引他們的人性。
GET EXPERT SECURITY ALERTS, MUST-KNOW TECH TIPS AND THE LATEST DIGITAL TRENDS STRAIGHT TO YOUR INBOX. SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW
獲取專家安全警報,必不可少的技術提示和最新的數字趨勢直接進入收件箱。立即註冊Kurt的《網絡刑報告》
A man typing on his computer keyboard (Kurt "CyberGuy" Knutsson)
一個在計算機鍵盤上打字的人(Kurt“ Cyberguy” Knutsson)
What is vishing?
什麼是溫釣?
Vishing, short for "voice phishing," is a type of cybercrime that uses phone calls to deceive individuals into revealing personal or financial information. Unlike traditional phishing, which relies on emails or text messages, vishing leverages the power of human voice and social engineering to manipulate victims. Scammers often impersonate legitimate organizations, such as banks, tech companies, or government agencies, to gain trust and create a sense of urgency. They may ask for passwords, credit card numbers, or other sensitive details, which they then use for fraudulent purposes.
Vishing是“語音網絡釣魚”的縮寫,是一種使用電話來欺騙個人揭示個人或財務信息的網絡犯罪。與依靠電子郵件或短信的傳統網絡釣魚不同,Vishing利用人類聲音和社會工程的力量來操縱受害者。騙子通常會冒充銀行,科技公司或政府機構等合法組織,以獲得信任並營造緊迫感。他們可能會要求提供密碼,信用卡號或其他敏感細節,然後將其用於欺詐目的。
Because vishing relies heavily on social engineering tactics, it can be difficult to detect, making it a particularly dangerous form of cybercrime.
由於Vishing在很大程度上依賴社會工程策略,因此很難檢測到它,使其成為網絡犯罪的特別危險形式。
Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)
黑客在工作中的插圖(Kurt“ Cyberguy” Knutsson)
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS
Mac,PC,iPhone和Android的最佳防病毒軟件 - 網絡挑選
The scam is a well-orchestrated play
騙局是一部精心策劃的戲劇
Let's break down these vishing schemes to understand why they are so effective. Once you see them as a staged play consisting of different acts, it becomes easier to recognize the individual tactics.
讓我們分解這些誘捕方案,以了解為什麼它們如此有效。一旦將它們視為由不同的行為組成的舞台演出,就更容易識別單個策略。
Act 1: The setup and targeting
行為1:設置和定位
Scammers start by identifying potential victims through social media, public transaction records, leaked databases, and more. Once they select a target, they gather personal details (email, phone number, financial holdings) to build credibility. And you could easily be a target. That’s because data brokers – companies that buy and sell your personal information – are goldmines for scammers. Your entire profile is likely out there, containing everything they need to run a successful scam: your name, address, contact details, family members, owned properties and more.
騙子首先通過社交媒體,公共交易記錄,洩漏數據庫等確定潛在的受害者。選擇目標後,他們會收集個人詳細信息(電子郵件,電話號碼,財務持有)以建立信譽。而且您很容易成為目標。這是因為數據經紀人(買賣您的個人信息的公司)是騙子的金礦。您的整個個人資料很可能包含他們成功騙局所需的一切:您的姓名,地址,聯繫方式,家庭成員,擁有的財產等等。
How to protect yourself at this stage:
在此階段如何保護自己:
Act 2: The first contact
第2幕:第一次聯繫
Scammers always initiate contact first. Let’s walk through a vishing scam using a Google account as an example.
騙子總是首先啟動聯繫。讓我們以Google帳戶為例中瀏覽誘餌騙局。
Google verification code text (Kurt "CyberGuy" Knutsson)
Google驗證代碼文本(Kurt“ Cyberguy” Knutsson)
Fake Google form (Kurt "CyberGuy" Knutsson)
假Google表格(Kurt“ Cyberguy” Knutsson)
How to protect yourself at this stage:
在此階段如何保護自己:
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
如何從互聯網上刪除私人數據
Act 3: Building trust
第3號法案:建立信任
Scammers no longer ask for passwords outright. That trick doesn’t work anymore. Here's what they do instead.
詐騙者不再要求密碼直接要求密碼。這個技巧不再起作用了。這就是他們所做的。
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
什麼是人工智能(AI)?
Illustration of username and password credential page (Kurt "CyberGuy" Knutsson)
用戶名和密碼憑據頁面的插圖(Kurt“ Cyberguy” Knutsson)
Act 4: The scam
行為4:騙局
After you successfully reset your password, scammers ask for one final step: log in. This is where the real scam happens.
成功重置密碼後,Scammers要求進行最後一步:登錄。這是真正騙局的地方。
How to protect yourself at this stage:
在此階段如何保護自己:
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
免費應用程序的隱藏成本:您的個人信息
Act 5: The heist
第5幕:搶劫
At this stage, the scammers end the call, leaving you feeling at ease. You won’t realize what happened until it’s too late. And it’s not just Google accounts at risk. The same method can be used to access Apple accounts, banking services and cryptocurrency wallets. For some, losing access to Google alone is devastating; after all, Google Drive, Google Photos and other cloud services store vast amounts of personal and financial data. But by the time you realize what’s happened, it’s already too late.
在此階段,騙子結束了電話,讓您感到輕鬆自在。直到為時已晚,您才意識到發生了什麼。這不僅僅是Google帳戶處於危險之中。可以使用相同的方法來訪問Apple帳戶,銀行服務和加密貨幣錢包。對於某些人來說,單獨失去對Google的訪問是毀滅性的。畢竟,Google Drive,Google Photos和其他雲服務存儲了大量的個人和財務數據。但是,當您意識到發生了什麼事時,已經太晚了。
How to protect yourself at this stage:
在此階段如何保護自己:
While securing your accounts and reporting fraud are crucial after a scam has already occurred, the best defense is preventing these attacks in the first place. Taking these steps can help ensure you don’t fall victim to a vishing scam in the first place.
在確保您的帳戶並報告欺詐行為之後,在發生騙局之後至關重要,但最好的防禦是首先阻止這些攻擊。採取這些步驟可以幫助您首先不會成為誘捕騙局的受害者。
How to protect yourself from vishing scams
如何保護自己免受誘人的騙局
1. Invest in personal data removal services: These scams all have one thing in common: they need some of your personal info to work. Without your name, phone number or email, these scams can't happen. Scammers
1。投資個人數據刪除服務:這些騙局都有一個共同點:他們需要您的一些個人信息才能工作。沒有您的姓名,電話號碼或電子郵件,這些騙局就不會發生。騙子
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
- Pepeto(Pepeto)令牌:青蛙的神收集了6個神聖文件
- 2025-03-06 17:10:42
- 目前,加密貨幣世界中的所有眼睛都在Pepeto上,這是一種以青蛙為主題的加密貨幣,引起了嚴重的嗡嗡聲。
-
- 在7分鐘內學習雪崩(Avax):逐步指南
- 2025-03-06 17:10:42
- 想像一下,您被困在交通中,永遠等待到需要去的地方。現在,想像一下有一條新的高速公路為您建造
-
-
- 打破Eth Denver:好,壞,怪異
- 2025-03-06 17:10:42
- 甚至在上週三飛往科羅拉多州丹佛之前,我完全希望以太坊社區中士兵的士氣被反映在Eth Denver的出勤人數中
-
- 監獄駐車(獄城)模因硬幣承諾有很多獎勵,但帶來了巨大的風險
- 2025-03-06 17:10:42
- 監獄託管是由戴夫·波特諾伊(Dave Portnoy)的在線角色和索拉納模因硬幣的病毒性質啟發的模因硬幣。
-
- Pepeto不僅是另一個以青蛙為主題的模因硬幣
- 2025-03-06 17:10:42
- Pepeto不僅是另一個以青蛙為主題的模因硬幣跳入加密池。這是一個特別的東西 - 一個體現六個基本原則的項目
-
-
-
- htx推出了USDD靈活的USDT存款,穩定12%APY
- 2025-03-06 17:00:42
- 最近的市場波動性是由比特幣和以太坊等主要資產進行重大糾正引發的,這導致了投資者的焦慮。