Settings
Language
Color Theme
What Is Vishing?
Vishing, short for voice and phishing, is a type of scam in which cybercriminals use phone calls to deceive and manipulate people.
Is vishing easy to detect?
No, detecting vishing has become increasingly difficult. Technological advancements and more sophisticated tactics have significantly enhanced the deception, making it challenging to identify fraudulent calls.
Common Vishing Tactics
Unlike traditional phishing, which primarily relies on email, vishing exploits voice communication's more intimate and direct nature.
Coercion And Urgency
Caller ID Spoofing
Ghost Calls
Vishing scammers often use fear or a sense of urgency to trick their victims. They may pretend that there is a problem with your bank account or that you are in legal trouble and must act immediately. Unlike legitimate organizations, these fraudsters aim to disrupt rational thinking and force quick decisions over the phone.
Another common tactic is caller ID spoofing, in which attackers disguise their phone numbers to appear as if they're calling from trusted entities, such as well-known businesses or government agencies. This deceit aims to lower your defenses by creating a false sense of security.
The strategy of ghost calls involves making brief calls and hanging up before the recipient can answer, prompting a call back out of curiosity or concern. This multi-layered approach is particularly effective in identifying individuals who are more likely to engage in conversation.
Is the following statement True or False:
Vishing scams are always easy to detect.
Vishing scams have become harder to spot due to their increasing complexity and the use of advanced technologies like AI. These enhancements allow scammers to sound more convincing, making it challenging to distinguish fraudulent calls from genuine ones.
View Options Again
True
False
Is the following statement True or False:
It is safe to provide personal information to unsolicited callers claiming to be from your bank.
It is never safe to give out your personal or sensitive financial information over the phone to unsolicited callers, even if they claim to be from a trusted institution like your bank. Scammers often impersonate legitimate organizations to trick you into divulging your details. Always verify the caller's identity by contacting the organization through official channels.
View Options Again
True
False
Understanding VoIP
Vishing attempts are prolific due to the widespread usage of VoIP (Voice over Internet Protocol) services. VoIP allows for easy and cost-effective communication over the internet, but it also provides malicious actors with the ability to:
Conduct Large Vishing Operations
Spoof Caller ID
Mask Location and Identity
Vishing is a growing threat that VoIP has enabled. VoIP allows scammers to execute large-scale phishing operations with minimal effort and expense.
VoIP services facilitate caller ID spoofing, allowing attackers to impersonate legitimate businesses, government agencies, or acquaintances, thereby increasing the likelihood of deceiving their targets.
These technologies enable scammers to mask their true location and identity, making it challenging for authorities to trace and stop them.
What is VoIP?
VoIP stands for Voice over Internet Protocol. VoIP enables internet-based calls, often used for cost-saving or flexibility, but can also be exploited for phone scams like vishing.
View Options Again
Voice Operated Internet Paging
Versatile Online Information Processing
Voice over Internet Protocol
Virtual Optical Imaging Process
What is Caller ID Spoofing?
Caller ID Spoofing is when scammers mimic the phone numbers of legitimate entities to earn your trust. Always exercise caution and verify the caller's identity through independent means before proceeding with any requests.
View Options Again
The manipulation of a caller ID to appear as a recognized or trustworthy number.
A social engineering tactic used by scammers to steal personal information.
A pre-recorded voice message.
A type of malware.
Signs of Vishing Attacks
Despite their complexity, vishing attempts often share certain telltale signs. Recognizing the signs of vishing is crucial in preventing personal and organizational data breaches.
Robotic Behaviour
High-Pressure Tactics
Requesting Confidential Information
This is when the caller sounds like a robot or keeps repeating the same things without really talking to you or adapting to the conversation's flow. If they fail to answer straightforward questions or their responses seem disconnected from the discussion, it’s likely a scam.
Vishers often create a sense of urgency, pressuring you to act quickly. They may claim that immediate action is required to fix a problem or avoid a threat. Legitimate organizations typically allow time for decision-making and verification.
Legitimate entities will not ask for sensitive information like passwords, PINs, or social security numbers over an unsolicited call.
What is NOT a telltale sign of a vishing attack?
An expected call from a trusted source is not a vishing sign. Vishing involves unsolicited requests for information, urgency, or odd caller behavior.
View Options Again
When the caller is applying high-pressure tactics.
You receive a call that you’ve been expecting from a trusted entity.
If the caller asks for sensitive information on an unexpected call.
When the caller keeps repeating themselves.
It’s Up to You!
While technical measures can help protect against vishing, awareness and education are the best defense mechanisms.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Vishing
[88, "Vishing", "Vishing"],
What Is Vishing?
[89, "What Is Vishing?", "What Is Vishing?"],
Vishing, short for voice and phishing, is a type of scam in which cybercriminals use phone calls to deceive and manipulate people.
[90, "Vishing, short for voice and phishing, is a type of scam in which cybercriminals use phone calls to deceive and manipulate people.", "Vishing, short for voice and phishing, is a type of scam in which cybercriminals use phone calls to deceive and manipulate people."],
Is vishing easy to detect?
[91, "Is vishing easy to detect?", "Is vishing easy to detect?"],
No, detecting vishing has become increasingly difficult. Technological advancements and more sophisticated tactics have significantly enhanced the deception, making it challenging to identify fraudulent calls.
[92, "No, detecting vishing has become increasingly difficult. Technological advancements and more sophisticated tactics have significantly enhanced the deception, making it challenging to identify fraudulent calls.", "No, detecting vishing has become increasingly difficult. Technological advancements and more sophisticated tactics have significantly enhanced the deception, making it challenging to identify fraudulent calls."],
Common Vishing Tactics
[93, "Common Vishing Tactics", "Common Vishing Tactics"],
Unlike traditional phishing, which primarily relies on email, vishing exploits voice communication's more intimate and direct nature.
[94, "Unlike traditional phishing, which primarily relies on email, vishing exploits voice communication's more intimate and direct nature.", "Unlike traditional phishing, which primarily relies on email, vishing exploits voice communication's more intimate and direct nature."],
Coercion And Urgency
[95, "Coercion And Urgency ", "Coercion And Urgency "],
Vishing scammers often use fear or a sense of urgency to trick their victims. They may pretend that there is a problem with your bank account or that you are in legal trouble and must act immediately. Unlike legitimate organizations, these fraudsters aim to disrupt rational thinking and force quick decisions over the phone.
[96, "Vishing scammers often use fear or a sense of urgency to trick their victims. They may pretend that there is a problem with your bank account or that you are in legal trouble and must act immediately. Unlike legitimate organizations, these fraudsters aim to disrupt rational thinking and force quick decisions over the phone. ", "Vishing scammers often use fear or a sense of urgency to trick their victims. They may pretend that there is a problem with your bank account or that you are in legal trouble and must act immediately. Unlike legitimate organizations, these fraudsters aim to disrupt rational thinking and force quick decisions over the phone. "],
Caller ID Spoofing
[97, "Caller ID Spoofing", "Caller ID Spoofing"],
Another common tactic is caller ID spoofing, in which attackers disguise their phone numbers to appear as if they're calling from trusted entities, such as well-known businesses or government agencies. This deceit aims to lower your defenses by creating a false sense of security.
[98, "Another common tactic is caller ID spoofing, in which attackers disguise their phone numbers to appear as if they're calling from trusted entities, such as well-known businesses or government agencies. This deceit aims to lower your defenses by creating a false sense of security.", "Another common tactic is caller ID spoofing, in which attackers disguise their phone numbers to appear as if they're calling from trusted entities, such as well-known businesses or government agencies. This deceit aims to lower your defenses by creating a false sense of security."],
Ghost Calls
[99, "Ghost Calls ", "Ghost Calls "],
The strategy of ghost calls involves making brief calls and hanging up before the recipient can answer, prompting a call back out of curiosity or concern. This multi-layered approach is particularly effective in identifying individuals who are more likely to engage in conversation.
[100, "The strategy of ghost calls involves making brief calls and hanging up before the recipient can answer, prompting a call back out of curiosity or concern. This multi-layered approach is particularly effective in identifying individuals who are more likely to engage in conversation.", "The strategy of ghost calls involves making brief calls and hanging up before the recipient can answer, prompting a call back out of curiosity or concern. This multi-layered approach is particularly effective in identifying individuals who are more likely to engage in conversation."],
Vishing scams are always easy to detect.
[101, "Vishing scams are always easy to detect.", "Vishing scams are always easy to detect."],
Vishing scams have become harder to spot due to their increasing complexity and the use of advanced technologies like AI. These enhancements allow scammers to sound more convincing, making it challenging to distinguish fraudulent calls from genuine ones.
[102, "Vishing scams have become harder to spot due to their increasing complexity and the use of advanced technologies like AI. These enhancements allow scammers to sound more convincing, making it challenging to distinguish fraudulent calls from genuine ones.", "Vishing scams have become harder to spot due to their increasing complexity and the use of advanced technologies like AI. These enhancements allow scammers to sound more convincing, making it challenging to distinguish fraudulent calls from genuine ones."],
It is safe to provide personal information to unsolicited callers claiming to be from your bank.
[103, "It is safe to provide personal information to unsolicited callers claiming to be from your bank.", "It is safe to provide personal information to unsolicited callers claiming to be from your bank."],
It is never safe to give out your personal or sensitive financial information over the phone to unsolicited callers, even if they claim to be from a trusted institution like your bank. Scammers often impersonate legitimate organizations to trick you into divulging your details. Always verify the caller's identity by contacting the organization through official channels.
[104, "It is never safe to give out your personal or sensitive financial information over the phone to unsolicited callers, even if they claim to be from a trusted institution like your bank. Scammers often impersonate legitimate organizations to trick you into divulging your details. Always verify the caller's identity by contacting the organization through official channels.", "It is never safe to give out your personal or sensitive financial information over the phone to unsolicited callers, even if they claim to be from a trusted institution like your bank. Scammers often impersonate legitimate organizations to trick you into divulging your details. Always verify the caller's identity by contacting the organization through official channels."],
Understanding VoIP
[105, "Understanding VoIP", "Understanding VoIP"],
Vishing attempts are prolific due to the widespread usage of VoIP (Voice over Internet Protocol) services. VoIP allows for easy and cost-effective communication over the internet, but it also provides malicious actors with the ability to:
[106, "Vishing attempts are prolific due to the widespread usage of VoIP (Voice over Internet Protocol) services. VoIP allows for easy and cost-effective communication over the internet, but it also provides malicious actors with the ability to: ", "Vishing attempts are prolific due to the widespread usage of VoIP (Voice over Internet Protocol) services. VoIP allows for easy and cost-effective communication over the internet, but it also provides malicious actors with the ability to: "],
Conduct Large Vishing Operations
[107, "Conduct Large Vishing Operations", "Conduct Large Vishing Operations"],
Vishing is a growing threat that VoIP has enabled. VoIP allows scammers to execute large-scale phishing operations with minimal effort and expense.
[108, "Vishing is a growing threat that VoIP has enabled. VoIP allows scammers to execute large-scale phishing operations with minimal effort and expense.", "Vishing is a growing threat that VoIP has enabled. VoIP allows scammers to execute large-scale phishing operations with minimal effort and expense."],
Spoof Caller ID
[109, "Spoof Caller ID ", "Spoof Caller ID "],
VoIP services facilitate caller ID spoofing, allowing attackers to impersonate legitimate businesses, government agencies, or acquaintances, thereby increasing the likelihood of deceiving their targets.
[110, "VoIP services facilitate caller ID spoofing, allowing attackers to impersonate legitimate businesses, government agencies, or acquaintances, thereby increasing the likelihood of deceiving their targets.", "VoIP services facilitate caller ID spoofing, allowing attackers to impersonate legitimate businesses, government agencies, or acquaintances, thereby increasing the likelihood of deceiving their targets."],
Mask Location and Identity
[111, "Mask Location and Identity", "Mask Location and Identity"],
These technologies enable scammers to mask their true location and identity, making it challenging for authorities to trace and stop them.
[112, "These technologies enable scammers to mask their true location and identity, making it challenging for authorities to trace and stop them.", "These technologies enable scammers to mask their true location and identity, making it challenging for authorities to trace and stop them."],
What is VoIP?
[113, "What is VoIP?", "What is VoIP?"],
Voice over Internet Protocol
[114, "Voice over Internet Protocol", "Voice over Internet Protocol"],
Versatile Online Information Processing
[115, "Versatile Online Information Processing", "Versatile Online Information Processing"],
Virtual Optical Imaging Process
[116, "Virtual Optical Imaging Process", "Virtual Optical Imaging Process"],
Voice Operated Internet Paging
[117, "Voice Operated Internet Paging", "Voice Operated Internet Paging"],
VoIP stands for Voice over Internet Protocol. VoIP enables internet-based calls, often used for cost-saving or flexibility, but can also be exploited for phone scams like vishing.
[118, "VoIP stands for Voice over Internet Protocol. VoIP enables internet-based calls, often used for cost-saving or flexibility, but can also be exploited for phone scams like vishing.", "VoIP stands for Voice over Internet Protocol. VoIP enables internet-based calls, often used for cost-saving or flexibility, but can also be exploited for phone scams like vishing."],
What is Caller ID Spoofing?
[119, "What is Caller ID Spoofing?", "What is Caller ID Spoofing?"],
A type of malware.
[120, "A type of malware.", "A type of malware."],
A social engineering tactic used by scammers to steal personal information.
[121, "A social engineering tactic used by scammers to steal personal information.", "A social engineering tactic used by scammers to steal personal information."],
A pre-recorded voice message.
[122, "A pre-recorded voice message.", "A pre-recorded voice message."],
The manipulation of a caller ID to appear as a recognized or trustworthy number.
[123, "The manipulation of a caller ID to appear as a recognized or trustworthy number.", "The manipulation of a caller ID to appear as a recognized or trustworthy number."],
Caller ID Spoofing is when scammers mimic the phone numbers of legitimate entities to earn your trust. Always exercise caution and verify the caller's identity through independent means before proceeding with any requests.
[124, "Caller ID Spoofing is when scammers mimic the phone numbers of legitimate entities to earn your trust. Always exercise caution and verify the caller's identity through independent means before proceeding with any requests.", "Caller ID Spoofing is when scammers mimic the phone numbers of legitimate entities to earn your trust. Always exercise caution and verify the caller's identity through independent means before proceeding with any requests."],
Signs of Vishing Attacks
[125, "Signs of Vishing Attacks", "Signs of Vishing Attacks"],
Despite their complexity, vishing attempts often share certain telltale signs. Recognizing the signs of vishing is crucial in preventing personal and organizational data breaches.
[126, "Despite their complexity, vishing attempts often share certain telltale signs. Recognizing the signs of vishing is crucial in preventing personal and organizational data breaches.", "Despite their complexity, vishing attempts often share certain telltale signs. Recognizing the signs of vishing is crucial in preventing personal and organizational data breaches."],
Robotic Behaviour
[127, "Robotic Behaviour ", "Robotic Behaviour "],
This is when the caller sounds like a robot or keeps repeating the same things without really talking to you or adapting to the conversation's flow. If they fail to answer straightforward questions or their responses seem disconnected from the discussion, it’s likely a scam.
[128, "This is when the caller sounds like a robot or keeps repeating the same things without really talking to you or adapting to the conversation's flow. If they fail to answer straightforward questions or their responses seem disconnected from the discussion, it’s likely a scam. ", "This is when the caller sounds like a robot or keeps repeating the same things without really talking to you or adapting to the conversation's flow. If they fail to answer straightforward questions or their responses seem disconnected from the discussion, it’s likely a scam. "],
High-Pressure Tactics
[129, "High-Pressure Tactics ", "High-Pressure Tactics "],
Vishers often create a sense of urgency, pressuring you to act quickly. They may claim that immediate action is required to fix a problem or avoid a threat. Legitimate organizations typically allow time for decision-making and verification.
[130, "Vishers often create a sense of urgency, pressuring you to act quickly. They may claim that immediate action is required to fix a problem or avoid a threat. Legitimate organizations typically allow time for decision-making and verification.", "Vishers often create a sense of urgency, pressuring you to act quickly. They may claim that immediate action is required to fix a problem or avoid a threat. Legitimate organizations typically allow time for decision-making and verification."],
Requesting Confidential Information
[131, "Requesting Confidential Information ", "Requesting Confidential Information "],
Legitimate entities will not ask for sensitive information like passwords, PINs, or social security numbers over an unsolicited call.
[132, "Legitimate entities will not ask for sensitive information like passwords, PINs, or social security numbers over an unsolicited call.", "Legitimate entities will not ask for sensitive information like passwords, PINs, or social security numbers over an unsolicited call."],
What is NOT a telltale sign of a vishing attack?
[133, "What is NOT a telltale sign of a vishing attack?", "What is NOT a telltale sign of a vishing attack?"],
When the caller keeps repeating themselves.
[134, "When the caller keeps repeating themselves.", "When the caller keeps repeating themselves."],
You receive a call that you’ve been expecting from a trusted entity.
[135, "You receive a call that you’ve been expecting from a trusted entity.", "You receive a call that you’ve been expecting from a trusted entity."],
When the caller is applying high-pressure tactics.
[136, "When the caller is applying high-pressure tactics.", "When the caller is applying high-pressure tactics."],
If the caller asks for sensitive information on an unexpected call.
[137, "If the caller asks for sensitive information on an unexpected call.", "If the caller asks for sensitive information on an unexpected call."],
An expected call from a trusted source is not a vishing sign. Vishing involves unsolicited requests for information, urgency, or odd caller behavior.
[138, "An expected call from a trusted source is not a vishing sign. Vishing involves unsolicited requests for information, urgency, or odd caller behavior. ", "An expected call from a trusted source is not a vishing sign. Vishing involves unsolicited requests for information, urgency, or odd caller behavior. "],
It’s Up to You!
[139, "It’s Up to You! ", "It’s Up to You! "],
While technical measures can help protect against vishing, awareness and education are the best defense mechanisms.
[140, "While technical measures can help protect against vishing, awareness and education are the best defense mechanisms.", "While technical measures can help protect against vishing, awareness and education are the best defense mechanisms."],
[141, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.