Free Courses Sale ends Soon, Get It Now


Vishing

Last Updated on 20th May, 2024
2 minutes, 49 seconds

Description

Vishing

Disclaimer: Copyright infringement is not intended.

Context:

  • The government released a circular warning its employees of a sophisticated cybercrime— vishing.

Vishing:

  • It is a short for voice+phishing.
  • It’s a technique wherein a threat actor calls the victim over the phone and tries to trick her into clicking on malicious files or emails, which can then take one to a legitimate-looking website asking her to share personal information.
  • In other cases, the attacker can ask for sensitive information from the victim.
  • The caller might appear as the manager or colleague of the victim, asking her to share sensitive information, at times using urgency as the tactic.
  • Artificial intelligence aids the attacker to imitate the voice and mannerisms to such an extent, making it easier to trick the victim.

Cyber attacks:

https://www.iasgyan.in/daily-current-affairs/cyber-attacks

Source:

https://www.financialexpress.com/life/technology-beware-of-vishing-how-not-to-fall-prey-to-voice-call-frauds-3492956/

https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.spiceworks.com%2Fit-security%2Fcyber-risk-management%2Farticles%2Fwhat-is-vishing%2F&psig=AOvVaw3r9T7uaiKOuQPYzXN20qPQ&ust=1716266109888000&source=images&cd=vfe&opi=89978449&ved=0CBUQ3YkBahcKEwjY797Os5uGAxUAAAAAHQAAAAAQCA

PRACTICE QUESTION

Q) Consider the following statements about the

  1. Vishing is a form of phishing conducted over the telephone.
  2. Vishing attacks typically involve fraudsters pretending to be representatives from legitimate organizations.
  3. Vishing attacks can be prevented by using two-factor authentication.

Which of the above statements is/are correct?

a) 1 only
b) 1 and 2 only
c) 2 and 3 only
d) 1, 2, and 3

Answer: b) 

Explanation:

  • Statement 1 is correct: 
    • Vishing, a combination of "voice" and "phishing," refers to fraudulent practices conducted over the phone to trick individuals into revealing personal information.
  • Statement 2 is correct: 
    • Vishing attacks often involve fraudsters pretending to be from legitimate organizations, such as banks or government agencies, to gain the trust of the victim.
  • Statement 3 is incorrect: 
    • While two-factor authentication (2FA) is an important security measure, it is primarily used to secure online accounts. Vishing prevention relies more on awareness and skepticism of unsolicited phone calls rather than 2FA.

Related Articles

CISF 14 Nov, 2024
CRISIS IN MANIPUR 13 Nov, 2024
ARROW 3 12 Nov, 2024
PINAKA 12 Nov, 2024
NAGA CONFLICT 11 Nov, 2024
MAHASAGAR 09 Nov, 2024

Free access to e-paper and WhatsApp updates

Let's Get In Touch!