![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
我们不仅为自己的未来省钱,而且为我们的孩子和孙子孙女省钱。
Many of us have families to look after. We save money not only for our own future but also – perhaps even more so – for our kids and grandkids. We want to secure a good education, help them buy a home or simply set aside something for when they need it.
我们中的许多人都有家人要照顾。我们不仅为自己的未来省钱,而且为我们的孩子和孙子孙女省钱。我们希望获得良好的教育,帮助他们购买房屋或在需要时为他们留出一些东西。
So did Tony. He’d saved a substantial amount for his sons' future, more than $4 million in bitcoin. And with just one click, he lost it all to vishing, a type of scam that uses phone calls to trick people into giving up sensitive information.
托尼也是如此。他为儿子的未来节省了大量资金,比特币超过400万美元。只需单击一下,他就把所有这些都丢给了葡萄酒,这是一种使用电话来欺骗人们放弃敏感信息的骗局。
Scammers posed as Google Support agents and, after an elaborate scheme, first caught his attention, then gained his trust and ultimately left him with nothing.
骗子扮演Google支持代理商,经过精心制定的计划,首先引起了他的注意,然后获得了信任,最终一无所有。
"Please, man. Is there anything you can do to give me something back?" was Tony’s final, desperate plea to the scammers, hoping to appeal to their humanity.
“拜托,伙计。你有什么可以给我回去的东西吗?”是托尼对骗子的最后一场拼命的恳求,希望能吸引他们的人性。
GET EXPERT SECURITY ALERTS, MUST-KNOW TECH TIPS AND THE LATEST DIGITAL TRENDS STRAIGHT TO YOUR INBOX. SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW
获取专家安全警报,必不可少的技术提示和最新的数字趋势直接进入收件箱。立即注册Kurt的《网络刑报告》
A man typing on his computer keyboard (Kurt "CyberGuy" Knutsson)
一个在计算机键盘上打字的人(Kurt“ Cyberguy” Knutsson)
What is vishing?
什么是温钓?
Vishing, short for "voice phishing," is a type of cybercrime that uses phone calls to deceive individuals into revealing personal or financial information. Unlike traditional phishing, which relies on emails or text messages, vishing leverages the power of human voice and social engineering to manipulate victims. Scammers often impersonate legitimate organizations, such as banks, tech companies, or government agencies, to gain trust and create a sense of urgency. They may ask for passwords, credit card numbers, or other sensitive details, which they then use for fraudulent purposes.
Vishing是“语音网络钓鱼”的缩写,是一种使用电话来欺骗个人揭示个人或财务信息的网络犯罪。与依靠电子邮件或短信的传统网络钓鱼不同,Vishing利用人类声音和社会工程的力量来操纵受害者。骗子通常会冒充银行,科技公司或政府机构等合法组织,以获得信任并营造紧迫感。他们可能会要求提供密码,信用卡号或其他敏感细节,然后将其用于欺诈目的。
Because vishing relies heavily on social engineering tactics, it can be difficult to detect, making it a particularly dangerous form of cybercrime.
由于Vishing在很大程度上依赖社会工程策略,因此很难检测到它,使其成为网络犯罪的特别危险形式。
Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)
黑客在工作中的插图(Kurt“ Cyberguy” Knutsson)
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS
Mac,PC,iPhone和Android的最佳防病毒软件 - 网络挑选
The scam is a well-orchestrated play
骗局是一部精心策划的戏剧
Let's break down these vishing schemes to understand why they are so effective. Once you see them as a staged play consisting of different acts, it becomes easier to recognize the individual tactics.
让我们分解这些诱捕方案,以了解为什么它们如此有效。一旦将它们视为由不同的行为组成的舞台演出,就更容易识别单个策略。
Act 1: The setup and targeting
行为1:设置和定位
Scammers start by identifying potential victims through social media, public transaction records, leaked databases, and more. Once they select a target, they gather personal details (email, phone number, financial holdings) to build credibility. And you could easily be a target. That’s because data brokers – companies that buy and sell your personal information – are goldmines for scammers. Your entire profile is likely out there, containing everything they need to run a successful scam: your name, address, contact details, family members, owned properties and more.
诈骗者首先通过社交媒体,公共交易记录,泄漏数据库等确定潜在的受害者。选择目标后,他们会收集个人详细信息(电子邮件,电话号码,财务持有)以建立信誉。而且您很容易成为目标。这是因为数据经纪人(买卖您的个人信息的公司)是骗子的金矿。您的整个个人资料很可能包含他们成功骗局所需的一切:您的姓名,地址,联系方式,家庭成员,拥有的财产等等。
How to protect yourself at this stage:
在此阶段如何保护自己:
Act 2: The first contact
第2幕:第一次联系
Scammers always initiate contact first. Let’s walk through a vishing scam using a Google account as an example.
骗子总是首先启动联系。让我们以Google帐户为例中浏览诱饵骗局。
Google verification code text (Kurt "CyberGuy" Knutsson)
Google验证代码文本(Kurt“ Cyberguy” Knutsson)
Fake Google form (Kurt "CyberGuy" Knutsson)
假Google表格(Kurt“ Cyberguy” Knutsson)
How to protect yourself at this stage:
在此阶段如何保护自己:
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
如何从互联网上删除私人数据
Act 3: Building trust
第3号法案:建立信任
Scammers no longer ask for passwords outright. That trick doesn’t work anymore. Here's what they do instead.
诈骗者不再要求密码直接要求密码。这个技巧不再起作用了。这就是他们所做的。
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
什么是人工智能(AI)?
Illustration of username and password credential page (Kurt "CyberGuy" Knutsson)
用户名和密码凭据页面的插图(Kurt“ Cyberguy” Knutsson)
Act 4: The scam
行为4:骗局
After you successfully reset your password, scammers ask for one final step: log in. This is where the real scam happens.
成功重置密码后,Scammers要求进行最后一步:登录。这是真正骗局的地方。
How to protect yourself at this stage:
在此阶段如何保护自己:
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
免费应用程序的隐藏成本:您的个人信息
Act 5: The heist
第5幕:抢劫
At this stage, the scammers end the call, leaving you feeling at ease. You won’t realize what happened until it’s too late. And it’s not just Google accounts at risk. The same method can be used to access Apple accounts, banking services and cryptocurrency wallets. For some, losing access to Google alone is devastating; after all, Google Drive, Google Photos and other cloud services store vast amounts of personal and financial data. But by the time you realize what’s happened, it’s already too late.
在此阶段,骗子结束了电话,让您感到轻松自在。直到为时已晚,您才意识到发生了什么。这不仅仅是Google帐户处于危险之中。可以使用相同的方法来访问Apple帐户,银行服务和加密货币钱包。对于某些人来说,单独失去对Google的访问是毁灭性的。毕竟,Google Drive,Google Photos和其他云服务存储了大量的个人和财务数据。但是,当您意识到发生了什么事时,已经太晚了。
How to protect yourself at this stage:
在此阶段如何保护自己:
While securing your accounts and reporting fraud are crucial after a scam has already occurred, the best defense is preventing these attacks in the first place. Taking these steps can help ensure you don’t fall victim to a vishing scam in the first place.
在确保您的帐户并报告欺诈行为之后,在发生骗局之后至关重要,但最好的防御是首先阻止这些攻击。采取这些步骤可以帮助您首先不会成为诱捕骗局的受害者。
How to protect yourself from vishing scams
如何保护自己免受诱人的骗局
1. Invest in personal data removal services: These scams all have one thing in common: they need some of your personal info to work. Without your name, phone number or email, these scams can't happen. Scammers
1。投资个人数据删除服务:这些骗局都有一个共同点:他们需要您的一些个人信息才能工作。没有您的姓名,电话号码或电子邮件,这些骗局就不会发生。骗子
免责声明:info@kdj.com
所提供的信息并非交易建议。根据本文提供的信息进行的任何投资,kdj.com不承担任何责任。加密货币具有高波动性,强烈建议您深入研究后,谨慎投资!
如您认为本网站上使用的内容侵犯了您的版权,请立即联系我们(info@kdj.com),我们将及时删除。
-
- 索拉纳(SOL)价格突破到200美元,因为看涨的合并将硬币翻转为新的每周高
- 2025-04-12 07:40:13
- 随着目前的看涨巩固将硬币转变为新的每周高点,Solana(Sol)的价格再次引起了人们的关注。
-
-
- 比特币在DXY的背面增长,该比特币已显示为99.86
- 2025-04-12 07:35:14
- 在唐纳德·特朗普(Donald Trump)征收的巨大关税并为中国(China)放宽时,我们都看过比特币的下降。
-
- 2025年的前10个云采矿地点(BTC)和Dogecoin(Doge)
- 2025-04-12 07:35:14
- 在2025年,传统的加密矿业开采越来越成为责任而不是机会。电力价格处于创纪录的高点和ASIC机器
-
-
- 比特币价格下跌以下是周一的关键心理门槛,降至79,000美元
- 2025-04-12 07:30:12
- 周一,比特币价格低于关键的心理门槛,下午降至79,000美元。尽管恢复了一些较早的损失
-
- 关税,关税,关税。特朗普在本周中占主导地位的征收税款。
- 2025-04-12 07:25:14
- 特朗普在本周中占主导地位的征收税款。一开始,关税将股票和加密货币明显降低。到最后
-
- 随着加密货币调节世界的加热,冷软件(冷)仍然致力于权力下放
- 2025-04-12 07:25:14
- SEC积极寻求Uniswap(Uni)和Coinbase等主要参与者的建议,加密货币监管的世界正在升温。
-
- 到2027
- 2025-04-12 07:20:13
- 免责声明:以下文章是赞助的,其中的观点并不代表Zycrypto的观点。读者应在采取与本文中提到的项目有关的任何行动之前进行独立研究。本文不应被视为投资建议。