Settings
Language
Color Theme
What is Smishing?
Smishing, short for SMS and phishing, is a type of scam in which cybercriminals use text messages to trick victims into revealing personal information, stealing money, or compromising their devices.
Common Smishing Tactics
Smishing attacks blend social engineering tactics with the convenience of texting.
Urgency
Spoofing
Fraudulent Updates
Urgent messages claiming to be from banks or financial institutions, warning of suspicious account activity or unauthorized access attempts, aim to panic recipients into clicking a malicious link or providing login credentials.
Scammers impersonate trusted institutions such as banks and government agencies with messages about tax rebates, stimulus checks, financial incentives, or account issues. By leveraging the authority of these entities, scammers prompt the recipient to divulge sensitive information or engage in transactions under the illusion of legitimacy.
Smishing messages frequently masquerade as legitimate updates or notifications from services that recipients are already interacting with or expecting communications from. These messages prompt action—clicking a link or providing information—under the guise of completing a routine transaction.
Which technique is NOT commonly used in smishing attacks?
Urgency, government impersonation, and sending fraudulent updates are all powerful tools in a smisher's arsenal. A pre-recorded message is commonly used in a vishing attack, in which the scammers use voice instead of text.
View Options Again
Sending fraudulent update messages that request an action be performed.
Using urgency to incite panic.
Using a pre-recorded message that is played when the victim picks up the phone.
Impersonating a government agency to offer payouts.
Seasonal Smishing
Smishers leverage seasonal and current events to create urgent scams, tapping into heightened emotions and interest, making their deceptive messages convincing and likely to be acted on.
Is the following statement True or False:
Smishers will take advantage of seasonal and current events to try to trick victims.
Smishers exploit seasonal and current events to craft timely, compelling scams that prey on victims' heightened interest and emotions during these periods, increasing the likelihood of their fraudulent messages being trusted and acted upon.
View Options Again
True
False
What does a smishing message look like? (1 of 2)
In this real-world smishing attack example, the attacker impersonates a government agency, uses relevant events, and offers payment promises to invoke interest, leading to a phishing website.
What does a smishing message look like? (2 of 2)
This message is designed to imitate a common phishing tactic, exploiting a missed package delivery scenario. It creates urgency by suggesting additional charges and prompting the recipient to click on a fake link, potentially leading to a phishing site designed to steal personal information or login credentials.
What can you do to prevent smishing?
Preventing smishing attacks starts with awareness and adopting smart practices to safeguard your information. Here are a few key strategies you can follow:
Stay Informed
Be Skeptical of Unsolicited Messages
Use Multi-Factor Authentication
Keep up-to-date with the news and be mindful of any smishing campaigns the media are reporting. Knowledge is a powerful tool for recognizing and avoiding scams.
Treat unexpected requests for personal information or urgent actions with suspicion, regardless of the source.
This adds an extra layer of security to your accounts, making it harder for attackers to gain access even if they have your credentials.
Smishing tactics are constantly evolving.
To effectively protect yourself, it's crucial to stay informed about the latest smishing techniques and security measures.
Why is it important to stay updated on smishing tactics?
Staying updated on smishing tactics is crucial because these tactics are always evolving. Cybercriminals constantly innovate, creating new methods to trick individuals. Understanding the latest techniques helps you stay one step ahead.
View Options Again
Smishing tactics evolve, and new methods are constantly developed.
It is not important; once you learn about smishing, you are set for life.
Smishing tactics never change.
All smishing messages are easily recognizable.
Is the following statement True or False:
Using multi-factor authentication helps to combat smishing.
Multi-factor authentication adds an extra layer of security. Even if your login information is compromised, attackers would still need to bypass an additional safeguard, such as a code in an authenticator mobile phone app, making unauthorized access significantly more difficult.
View Options Again
True
False
What to do if you've fallen victim to smishing.
If you suspect you've fallen victim to a smishing attack, acting quickly is crucial to mitigate any potential damage. Here's what you should do:
Notify Financial Institutions
Change Passwords
Report the Incident
If you've shared financial information, contact your bank or credit card company immediately to report the potential fraud and secure your accounts.
Update passwords for any accounts at risk, especially if they were shared or accessed through a smishing link.
File a report with relevant authorities, such as your local police department. If you've been compromised on a company or BYOD device, inform your IT team immediately.
What should you do if you suspect you’ve fallen for smishing?
If you accidentally responded to a scam message and shared your financial details, you should immediately contact your bank or credit card company. They can help secure your accounts by monitoring for unusual activity or changing your account details to prevent unauthorized access.
View Options Again
Ignore the message and hope for the best.
Contact your bank if you’ve shared financial information.
Share the message with friends to warn them.
Delete the message and forget about it.
Staying Safe Is Up to You!
The best defense against smishing is awareness. Remember, stay informed, remain skeptical, and use multi-factor authentication whenever possible.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Smishing
[88, "Smishing", "Smishing"],
What is Smishing?
[89, "What is Smishing?", "What is Smishing?"],
Smishing, short for SMS and phishing, is a type of scam in which cybercriminals use text messages to trick victims into revealing personal information, stealing money, or compromising their devices.
[90, "Smishing, short for SMS and phishing, is a type of scam in which cybercriminals use text messages to trick victims into revealing personal information, stealing money, or compromising their devices.", "Smishing, short for SMS and phishing, is a type of scam in which cybercriminals use text messages to trick victims into revealing personal information, stealing money, or compromising their devices."],
Common Smishing Tactics
[91, "Common Smishing Tactics", "Common Smishing Tactics"],
Smishing attacks blend social engineering tactics with the convenience of texting.
[92, "Smishing attacks blend social engineering tactics with the convenience of texting.", "Smishing attacks blend social engineering tactics with the convenience of texting."],
Urgency
[93, "Urgency", "Urgency"],
Urgent messages claiming to be from banks or financial institutions, warning of suspicious account activity or unauthorized access attempts, aim to panic recipients into clicking a malicious link or providing login credentials.
[94, "Urgent messages claiming to be from banks or financial institutions, warning of suspicious account activity or unauthorized access attempts, aim to panic recipients into clicking a malicious link or providing login credentials.", "Urgent messages claiming to be from banks or financial institutions, warning of suspicious account activity or unauthorized access attempts, aim to panic recipients into clicking a malicious link or providing login credentials."],
Spoofing
[95, "Spoofing", "Spoofing"],
Scammers impersonate trusted institutions such as banks and government agencies with messages about tax rebates, stimulus checks, financial incentives, or account issues. By leveraging the authority of these entities, scammers prompt the recipient to divulge sensitive information or engage in transactions under the illusion of legitimacy.
[96, "Scammers impersonate trusted institutions such as banks and government agencies with messages about tax rebates, stimulus checks, financial incentives, or account issues. By leveraging the authority of these entities, scammers prompt the recipient to divulge sensitive information or engage in transactions under the illusion of legitimacy.", "Scammers impersonate trusted institutions such as banks and government agencies with messages about tax rebates, stimulus checks, financial incentives, or account issues. By leveraging the authority of these entities, scammers prompt the recipient to divulge sensitive information or engage in transactions under the illusion of legitimacy."],
Fraudulent Updates
[97, "Fraudulent Updates", "Fraudulent Updates"],
Smishing messages frequently masquerade as legitimate updates or notifications from services that recipients are already interacting with or expecting communications from. These messages prompt action—clicking a link or providing information—under the guise of completing a routine transaction.
[98, "Smishing messages frequently masquerade as legitimate updates or notifications from services that recipients are already interacting with or expecting communications from. These messages prompt action—clicking a link or providing information—under the guise of completing a routine transaction.", "Smishing messages frequently masquerade as legitimate updates or notifications from services that recipients are already interacting with or expecting communications from. These messages prompt action—clicking a link or providing information—under the guise of completing a routine transaction."],
Which technique is NOT commonly used in smishing attacks?
[99, "Which technique is NOT commonly used in smishing attacks?", "Which technique is NOT commonly used in smishing attacks?"],
Using urgency to incite panic.
[100, "Using urgency to incite panic.", "Using urgency to incite panic."],
Impersonating a government agency to offer payouts.
[101, "Impersonating a government agency to offer payouts.", "Impersonating a government agency to offer payouts."],
Sending fraudulent update messages that request an action be performed.
[102, "Sending fraudulent update messages that request an action be performed.", "Sending fraudulent update messages that request an action be performed."],
Using a pre-recorded message that is played when the victim picks up the phone.
[103, "Using a pre-recorded message that is played when the victim picks up the phone.", "Using a pre-recorded message that is played when the victim picks up the phone."],
Urgency, government impersonation, and sending fraudulent updates are all powerful tools in a smisher's arsenal. A pre-recorded message is commonly used in a vishing attack, in which the scammers use voice instead of text.
[104, "Urgency, government impersonation, and sending fraudulent updates are all powerful tools in a smisher's arsenal. A pre-recorded message is commonly used in a vishing attack, in which the scammers use voice instead of text.", "Urgency, government impersonation, and sending fraudulent updates are all powerful tools in a smisher's arsenal. A pre-recorded message is commonly used in a vishing attack, in which the scammers use voice instead of text."],
Seasonal Smishing
[105, "Seasonal Smishing", "Seasonal Smishing"],
Smishers leverage seasonal and current events to create urgent scams, tapping into heightened emotions and interest, making their deceptive messages convincing and likely to be acted on.
[106, "Smishers leverage seasonal and current events to create urgent scams, tapping into heightened emotions and interest, making their deceptive messages convincing and likely to be acted on.", "Smishers leverage seasonal and current events to create urgent scams, tapping into heightened emotions and interest, making their deceptive messages convincing and likely to be acted on."],
Smishers will take advantage of seasonal and current events to try to trick victims.
[107, "Smishers will take advantage of seasonal and current events to try to trick victims. ", "Smishers will take advantage of seasonal and current events to try to trick victims. "],
Smishers exploit seasonal and current events to craft timely, compelling scams that prey on victims' heightened interest and emotions during these periods, increasing the likelihood of their fraudulent messages being trusted and acted upon.
[108, "Smishers exploit seasonal and current events to craft timely, compelling scams that prey on victims' heightened interest and emotions during these periods, increasing the likelihood of their fraudulent messages being trusted and acted upon.", "Smishers exploit seasonal and current events to craft timely, compelling scams that prey on victims' heightened interest and emotions during these periods, increasing the likelihood of their fraudulent messages being trusted and acted upon."],
What does a smishing message look like? (1 of 2)
[109, "What does a smishing message look like? (1 of 2)", "What does a smishing message look like? (1 of 2)"],
In this real-world smishing attack example, the attacker impersonates a government agency, uses relevant events, and offers payment promises to invoke interest, leading to a phishing website.
[110, "In this real-world smishing attack example, the attacker impersonates a government agency, uses relevant events, and offers payment promises to invoke interest, leading to a phishing website.", "In this real-world smishing attack example, the attacker impersonates a government agency, uses relevant events, and offers payment promises to invoke interest, leading to a phishing website."],
What does a smishing message look like? (2 of 2)
[111, "What does a smishing message look like? (2 of 2)", "What does a smishing message look like? (2 of 2)"],
This message is designed to imitate a common phishing tactic, exploiting a missed package delivery scenario. It creates urgency by suggesting additional charges and prompting the recipient to click on a fake link, potentially leading to a phishing site designed to steal personal information or login credentials.
[112, "This message is designed to imitate a common phishing tactic, exploiting a missed package delivery scenario. It creates urgency by suggesting additional charges and prompting the recipient to click on a fake link, potentially leading to a phishing site designed to steal personal information or login credentials.", "This message is designed to imitate a common phishing tactic, exploiting a missed package delivery scenario. It creates urgency by suggesting additional charges and prompting the recipient to click on a fake link, potentially leading to a phishing site designed to steal personal information or login credentials."],
What can you do to prevent smishing?
[113, "What can you do to prevent smishing?", "What can you do to prevent smishing?"],
Preventing smishing attacks starts with awareness and adopting smart practices to safeguard your information. Here are a few key strategies you can follow:
[114, "Preventing smishing attacks starts with awareness and adopting smart practices to safeguard your information. Here are a few key strategies you can follow:", "Preventing smishing attacks starts with awareness and adopting smart practices to safeguard your information. Here are a few key strategies you can follow:"],
Stay Informed
[115, "Stay Informed", "Stay Informed"],
Keep up-to-date with the news and be mindful of any smishing campaigns the media are reporting. Knowledge is a powerful tool for recognizing and avoiding scams.
[116, "Keep up-to-date with the news and be mindful of any smishing campaigns the media are reporting. Knowledge is a powerful tool for recognizing and avoiding scams.", "Keep up-to-date with the news and be mindful of any smishing campaigns the media are reporting. Knowledge is a powerful tool for recognizing and avoiding scams."],
Be Skeptical of Unsolicited Messages
[117, "Be Skeptical of Unsolicited Messages", "Be Skeptical of Unsolicited Messages"],
Treat unexpected requests for personal information or urgent actions with suspicion, regardless of the source.
[118, "Treat unexpected requests for personal information or urgent actions with suspicion, regardless of the source.", "Treat unexpected requests for personal information or urgent actions with suspicion, regardless of the source."],
Use Multi-Factor Authentication
[119, "Use Multi-Factor Authentication", "Use Multi-Factor Authentication"],
This adds an extra layer of security to your accounts, making it harder for attackers to gain access even if they have your credentials.
[120, "This adds an extra layer of security to your accounts, making it harder for attackers to gain access even if they have your credentials.", "This adds an extra layer of security to your accounts, making it harder for attackers to gain access even if they have your credentials."],
Smishing tactics are constantly evolving.
[121, "Smishing tactics are constantly evolving.", "Smishing tactics are constantly evolving."],
To effectively protect yourself, it's crucial to stay informed about the latest smishing techniques and security measures.
[122, " To effectively protect yourself, it's crucial to stay informed about the latest smishing techniques and security measures.", " To effectively protect yourself, it's crucial to stay informed about the latest smishing techniques and security measures."],
Why is it important to stay updated on smishing tactics?
[123, "Why is it important to stay updated on smishing tactics?", "Why is it important to stay updated on smishing tactics?"],
Smishing tactics never change.
[124, "Smishing tactics never change.", "Smishing tactics never change."],
Smishing tactics evolve, and new methods are constantly developed.
[125, "Smishing tactics evolve, and new methods are constantly developed.", "Smishing tactics evolve, and new methods are constantly developed."],
It is not important; once you learn about smishing, you are set for life.
[126, "It is not important; once you learn about smishing, you are set for life.", "It is not important; once you learn about smishing, you are set for life."],
All smishing messages are easily recognizable.
[127, "All smishing messages are easily recognizable.", "All smishing messages are easily recognizable."],
Staying updated on smishing tactics is crucial because these tactics are always evolving. Cybercriminals constantly innovate, creating new methods to trick individuals. Understanding the latest techniques helps you stay one step ahead.
[128, "Staying updated on smishing tactics is crucial because these tactics are always evolving. Cybercriminals constantly innovate, creating new methods to trick individuals. Understanding the latest techniques helps you stay one step ahead.", "Staying updated on smishing tactics is crucial because these tactics are always evolving. Cybercriminals constantly innovate, creating new methods to trick individuals. Understanding the latest techniques helps you stay one step ahead."],
Using multi-factor authentication helps to combat smishing.
[129, "Using multi-factor authentication helps to combat smishing.", "Using multi-factor authentication helps to combat smishing."],
Multi-factor authentication adds an extra layer of security. Even if your login information is compromised, attackers would still need to bypass an additional safeguard, such as a code in an authenticator mobile phone app, making unauthorized access significantly more difficult.
[130, "Multi-factor authentication adds an extra layer of security. Even if your login information is compromised, attackers would still need to bypass an additional safeguard, such as a code in an authenticator mobile phone app, making unauthorized access significantly more difficult.", "Multi-factor authentication adds an extra layer of security. Even if your login information is compromised, attackers would still need to bypass an additional safeguard, such as a code in an authenticator mobile phone app, making unauthorized access significantly more difficult."],
What to do if you've fallen victim to smishing.
[131, "What to do if you've fallen victim to smishing.", "What to do if you've fallen victim to smishing."],
If you suspect you've fallen victim to a smishing attack, acting quickly is crucial to mitigate any potential damage. Here's what you should do:
[132, "If you suspect you've fallen victim to a smishing attack, acting quickly is crucial to mitigate any potential damage. Here's what you should do:", "If you suspect you've fallen victim to a smishing attack, acting quickly is crucial to mitigate any potential damage. Here's what you should do:"],
Notify Financial Institutions
[133, "Notify Financial Institutions", "Notify Financial Institutions"],
If you've shared financial information, contact your bank or credit card company immediately to report the potential fraud and secure your accounts.
[134, "If you've shared financial information, contact your bank or credit card company immediately to report the potential fraud and secure your accounts.", "If you've shared financial information, contact your bank or credit card company immediately to report the potential fraud and secure your accounts."],
Change Passwords
[135, "Change Passwords", "Change Passwords"],
Update passwords for any accounts at risk, especially if they were shared or accessed through a smishing link.
[136, "Update passwords for any accounts at risk, especially if they were shared or accessed through a smishing link.", "Update passwords for any accounts at risk, especially if they were shared or accessed through a smishing link."],
Report the Incident
[137, "Report the Incident", "Report the Incident"],
File a report with relevant authorities, such as your local police department. If you've been compromised on a company or BYOD device, inform your IT team immediately.
[138, "File a report with relevant authorities, such as your local police department. If you've been compromised on a company or BYOD device, inform your IT team immediately.", "File a report with relevant authorities, such as your local police department. If you've been compromised on a company or BYOD device, inform your IT team immediately."],
What should you do if you suspect you’ve fallen for smishing?
[139, "What should you do if you suspect you’ve fallen for smishing?", "What should you do if you suspect you’ve fallen for smishing?"],
Ignore the message and hope for the best.
[140, "Ignore the message and hope for the best.", "Ignore the message and hope for the best."],
Contact your bank if you’ve shared financial information.
[141, "Contact your bank if you’ve shared financial information.", "Contact your bank if you’ve shared financial information."],
Share the message with friends to warn them.
[142, "Share the message with friends to warn them.", "Share the message with friends to warn them."],
Delete the message and forget about it.
[143, "Delete the message and forget about it.", "Delete the message and forget about it."],
If you accidentally responded to a scam message and shared your financial details, you should immediately contact your bank or credit card company. They can help secure your accounts by monitoring for unusual activity or changing your account details to prevent unauthorized access.
[144, "If you accidentally responded to a scam message and shared your financial details, you should immediately contact your bank or credit card company. They can help secure your accounts by monitoring for unusual activity or changing your account details to prevent unauthorized access.", "If you accidentally responded to a scam message and shared your financial details, you should immediately contact your bank or credit card company. They can help secure your accounts by monitoring for unusual activity or changing your account details to prevent unauthorized access."],
Staying Safe Is Up to You!
[145, "Staying Safe Is Up to You! ", "Staying Safe Is Up to You! "],
The best defense against smishing is awareness. Remember, stay informed, remain skeptical, and use multi-factor authentication whenever possible.
[146, "The best defense against smishing is awareness. Remember, stay informed, remain skeptical, and use multi-factor authentication whenever possible.", "The best defense against smishing is awareness. Remember, stay informed, remain skeptical, and use multi-factor authentication whenever possible."],
[147, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.