Article — Smishing

Thanks for sharing this!

First there was phishing. Now there’s smishing. And what is smishing?

Smishing is cell phone phishing. The term is derived from the abbreviation for Short Message Service (SMS), the technology used for text messages on cell phones, and the scam is designed to part you from your personal information via a text message sent to your cell phone telling you you’ve won a prize, or an online bank has a gift for you, or your dating service wants to update your information. The message provides a toll free number that connects to a bogus web site or automatic response system. A variant of smishing is vishing, or voice phishing, which happens when the scammer leaves a voice message on your phone instead of a text.

Your mission—and yes, you should choose to accept it—is to practice safe cell phoning. Here are tips.

Image source: WZ Overleg / bijdragen / blokkeer, via Wikimedia Commons

Image source: WZ Overleg / bijdragen / blokkeer, via Wikimedia Commons

  • Avoid calling numbers with prefixes that are unfamiliar to you.
  • Do not give out account numbers or credit card information via text.
  • Add security software to your mobile device.
  • Set up or turn on an alias program through your cell provider. Your real ID will be concealed and only your alias will be displayed in your text messages.
  • Report smishing messages by forwarding them to 7726 (which spells “spam”) so your provider will mark them as scams.

Got that? Now memorize this information before the page self-destructs.


You might also like these posts

Article – Preparing for Hurricane Season Image source: By Nilfanion , via Wikimedia Commons. The map shows the tracks of all tropical cyclones which formed worldwide from 1985 to 2005.The Atlantic hurricane season begins June 1. While the 2014 season is expected to be a mild one, mild doesn’t mean storm-free. Getting ready early is a good idea—and early preparati...
Article — Locked Out Image source: UK, public domain, via Wikimedia Commons What’s on your computer? Your manuscripts? Work? Photos? What would you do if you were denied access to those files—if you were locked out by rogue hackers? If you’re shaking your head because you think nothing on your computer is of value to hackers, consider th...
Article — Tax Identity Theft Awareness Week Image source: Taxes are scary enough, without adding tax identity theft to the mix. The costs—$3.6 billion a year according to an estimate by the US Treasury Inspector General for Tax Administration—are scary, too. Unfortunately, both tax ID theft and the costs are on the rise. The US Federal Trade Commission...
Article — Your 2013 Federal Income Tax Return Image source: Whether you’re a part- or full-time freelancer, receiving income means filing a tax return. Here are three things to keep in mind as you look back at your 2013 business activity. Dates: The IRS will begin accepting 2013 business returns on Monday, January 13, 2014. For individual returns, the da...

We write. Visit us in Carpenter Country, a magical place that, like our stories, is unreal but not untrue.

Posted in Articles Tagged with: ,