Download presentation
Presentation is loading. Please wait.
Published byLetitia Hoover Modified over 9 years ago
4
321 Phishing Vishing SMiShing Social Engineering Techniques
5
Identity information
7
I’m senior manager. I need your password authorize a transaction for a client. It’s urgent. The client is waiting, I will hold. Hacker pretending to be Senior Manager Victim My password is p@ssw0rd
8
A combination of voice and phishing Software engineers use a telephone system that uses a Voice over IP (VoIP) Vishing is used for financial gain to steal credit card number or other personal information used in identity thief schemes from around the world.
10
A combination of SMs and phiSHING Scammers are targeting mobile devices to get you to reveal your personal information. Send text messages to you and ask to validate or respond to the request. Once responded, scammer just got you and launched a worm or a malware on your mobile device. Once downloaded on your mobile devices, spyware can eavesdrop on all your conversations gathering information about you.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.