![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
我们不仅为自己的未来省钱,而且为我们的孩子和孙子孙女省钱。
Many of us have families to look after. We save money not only for our own future but also – perhaps even more so – for our kids and grandkids. We want to secure a good education, help them buy a home or simply set aside something for when they need it.
我们中的许多人都有家人要照顾。我们不仅为自己的未来省钱,而且为我们的孩子和孙子孙女省钱。我们希望获得良好的教育,帮助他们购买房屋或在需要时为他们留出一些东西。
So did Tony. He’d saved a substantial amount for his sons' future, more than $4 million in bitcoin. And with just one click, he lost it all to vishing, a type of scam that uses phone calls to trick people into giving up sensitive information.
托尼也是如此。他为儿子的未来节省了大量资金,比特币超过400万美元。只需单击一下,他就把所有这些都丢给了葡萄酒,这是一种使用电话来欺骗人们放弃敏感信息的骗局。
Scammers posed as Google Support agents and, after an elaborate scheme, first caught his attention, then gained his trust and ultimately left him with nothing.
骗子扮演Google支持代理商,经过精心制定的计划,首先引起了他的注意,然后获得了信任,最终一无所有。
"Please, man. Is there anything you can do to give me something back?" was Tony’s final, desperate plea to the scammers, hoping to appeal to their humanity.
“拜托,伙计。你有什么可以给我回去的东西吗?”是托尼对骗子的最后一场拼命的恳求,希望能吸引他们的人性。
GET EXPERT SECURITY ALERTS, MUST-KNOW TECH TIPS AND THE LATEST DIGITAL TRENDS STRAIGHT TO YOUR INBOX. SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW
获取专家安全警报,必不可少的技术提示和最新的数字趋势直接进入收件箱。立即注册Kurt的《网络刑报告》
A man typing on his computer keyboard (Kurt "CyberGuy" Knutsson)
一个在计算机键盘上打字的人(Kurt“ Cyberguy” Knutsson)
What is vishing?
什么是温钓?
Vishing, short for "voice phishing," is a type of cybercrime that uses phone calls to deceive individuals into revealing personal or financial information. Unlike traditional phishing, which relies on emails or text messages, vishing leverages the power of human voice and social engineering to manipulate victims. Scammers often impersonate legitimate organizations, such as banks, tech companies, or government agencies, to gain trust and create a sense of urgency. They may ask for passwords, credit card numbers, or other sensitive details, which they then use for fraudulent purposes.
Vishing是“语音网络钓鱼”的缩写,是一种使用电话来欺骗个人揭示个人或财务信息的网络犯罪。与依靠电子邮件或短信的传统网络钓鱼不同,Vishing利用人类声音和社会工程的力量来操纵受害者。骗子通常会冒充银行,科技公司或政府机构等合法组织,以获得信任并营造紧迫感。他们可能会要求提供密码,信用卡号或其他敏感细节,然后将其用于欺诈目的。
Because vishing relies heavily on social engineering tactics, it can be difficult to detect, making it a particularly dangerous form of cybercrime.
由于Vishing在很大程度上依赖社会工程策略,因此很难检测到它,使其成为网络犯罪的特别危险形式。
Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)
黑客在工作中的插图(Kurt“ Cyberguy” Knutsson)
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS
Mac,PC,iPhone和Android的最佳防病毒软件 - 网络挑选
The scam is a well-orchestrated play
骗局是一部精心策划的戏剧
Let's break down these vishing schemes to understand why they are so effective. Once you see them as a staged play consisting of different acts, it becomes easier to recognize the individual tactics.
让我们分解这些诱捕方案,以了解为什么它们如此有效。一旦将它们视为由不同的行为组成的舞台演出,就更容易识别单个策略。
Act 1: The setup and targeting
行为1:设置和定位
Scammers start by identifying potential victims through social media, public transaction records, leaked databases, and more. Once they select a target, they gather personal details (email, phone number, financial holdings) to build credibility. And you could easily be a target. That’s because data brokers – companies that buy and sell your personal information – are goldmines for scammers. Your entire profile is likely out there, containing everything they need to run a successful scam: your name, address, contact details, family members, owned properties and more.
诈骗者首先通过社交媒体,公共交易记录,泄漏数据库等确定潜在的受害者。选择目标后,他们会收集个人详细信息(电子邮件,电话号码,财务持有)以建立信誉。而且您很容易成为目标。这是因为数据经纪人(买卖您的个人信息的公司)是骗子的金矿。您的整个个人资料很可能包含他们成功骗局所需的一切:您的姓名,地址,联系方式,家庭成员,拥有的财产等等。
How to protect yourself at this stage:
在此阶段如何保护自己:
Act 2: The first contact
第2幕:第一次联系
Scammers always initiate contact first. Let’s walk through a vishing scam using a Google account as an example.
骗子总是首先启动联系。让我们以Google帐户为例中浏览诱饵骗局。
Google verification code text (Kurt "CyberGuy" Knutsson)
Google验证代码文本(Kurt“ Cyberguy” Knutsson)
Fake Google form (Kurt "CyberGuy" Knutsson)
假Google表格(Kurt“ Cyberguy” Knutsson)
How to protect yourself at this stage:
在此阶段如何保护自己:
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
如何从互联网上删除私人数据
Act 3: Building trust
第3号法案:建立信任
Scammers no longer ask for passwords outright. That trick doesn’t work anymore. Here's what they do instead.
诈骗者不再要求密码直接要求密码。这个技巧不再起作用了。这就是他们所做的。
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
什么是人工智能(AI)?
Illustration of username and password credential page (Kurt "CyberGuy" Knutsson)
用户名和密码凭据页面的插图(Kurt“ Cyberguy” Knutsson)
Act 4: The scam
行为4:骗局
After you successfully reset your password, scammers ask for one final step: log in. This is where the real scam happens.
成功重置密码后,Scammers要求进行最后一步:登录。这是真正骗局的地方。
How to protect yourself at this stage:
在此阶段如何保护自己:
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
免费应用程序的隐藏成本:您的个人信息
Act 5: The heist
第5幕:抢劫
At this stage, the scammers end the call, leaving you feeling at ease. You won’t realize what happened until it’s too late. And it’s not just Google accounts at risk. The same method can be used to access Apple accounts, banking services and cryptocurrency wallets. For some, losing access to Google alone is devastating; after all, Google Drive, Google Photos and other cloud services store vast amounts of personal and financial data. But by the time you realize what’s happened, it’s already too late.
在此阶段,骗子结束了电话,让您感到轻松自在。直到为时已晚,您才意识到发生了什么。这不仅仅是Google帐户处于危险之中。可以使用相同的方法来访问Apple帐户,银行服务和加密货币钱包。对于某些人来说,单独失去对Google的访问是毁灭性的。毕竟,Google Drive,Google Photos和其他云服务存储了大量的个人和财务数据。但是,当您意识到发生了什么事时,已经太晚了。
How to protect yourself at this stage:
在此阶段如何保护自己:
While securing your accounts and reporting fraud are crucial after a scam has already occurred, the best defense is preventing these attacks in the first place. Taking these steps can help ensure you don’t fall victim to a vishing scam in the first place.
在确保您的帐户并报告欺诈行为之后,在发生骗局之后至关重要,但最好的防御是首先阻止这些攻击。采取这些步骤可以帮助您首先不会成为诱捕骗局的受害者。
How to protect yourself from vishing scams
如何保护自己免受诱人的骗局
1. Invest in personal data removal services: These scams all have one thing in common: they need some of your personal info to work. Without your name, phone number or email, these scams can't happen. Scammers
1。投资个人数据删除服务:这些骗局都有一个共同点:他们需要您的一些个人信息才能工作。没有您的姓名,电话号码或电子邮件,这些骗局就不会发生。骗子
免责声明:info@kdj.com
所提供的信息并非交易建议。根据本文提供的信息进行的任何投资,kdj.com不承担任何责任。加密货币具有高波动性,强烈建议您深入研究后,谨慎投资!
如您认为本网站上使用的内容侵犯了您的版权,请立即联系我们(info@kdj.com),我们将及时删除。
-
-
- 比特币(BTC)超越了数字黄金,使用智能合约和用第2层解决方案的智能合约发展
- 2025-03-06 16:40:42
- 长期以来,比特币被视为世界上最安全的价值商店,正在悄悄地进行转型。
-
-
- 山gox在市场波动中转移12,000 BTC
- 2025-03-06 16:40:42
- 破产的加密货币交易所Gox山已将价值超过10亿美元的12,000比特币(BTC)转移给了一个身份不明的钱包。
-
- Bitget Wallet介绍了AI代码分析,以帮助用户做出明智的交易决策
- 2025-03-06 16:40:42
- AI代币分析通过识别新兴叙事,市场情感变化和代币动力,超越了传统数据跟踪。
-
-
- 香港地标与广东话歌剧的代名词关闭了大门
- 2025-03-06 16:40:42
- 周一天黑后,人群挤在香港的北点区的街道上,渴望拍摄Sunbeam Theatre的照片
-
- 7便宜的加密货币将一些幸运的投资者的职位变成了一夜之间的命运
- 2025-03-06 16:40:42
- 有了数万个选择,我们将其范围缩小到了最好的七个。每个人都有很多看涨的市场潜力
-
- BTFD硬币(购买蘸酱)预售越来越热
- 2025-03-06 16:40:42
- 模因硬币的世界就像是过山车的骑行:激动人心,不可预测的和适量的混乱。有些人有多年的腿要跑,而另一些则比趋势快。