Akademik

phone phishing
pp.
Using a phone call to obtain a person's personal, financial, or password data. Also: telephone phishing.
Example Citations:
One of the most prevalent and accessible methods of gaining access to personal data is the simple process of picking up the phone and calling a customer service call center. Customer service agents are trained to "take care" of callers and often will go to great lengths to be helpful. This is just what an identity thief is counting on. The concept of taking advantage of helpful customer service agents to steal information over the telephone is sometimes called phone phishing or pretext calling; in a broader context it can be referred to as social engineering. Phone phishing is particularly disturbing because unlike Internet phishing, the victim is not involved and is completely unaware that someone else is calling pretending to be them. With just a few calls, thieves can gain the bits and pieces of data required to assemble unquestioned access to a customer's accounts and other information.
— George T. Platt, "Phone Phishing: Are your Agents Too Helpful?," Connections Magazine, July/August 2005
For many of the most sophisticated Phishers, telephone Phishing has become the method of choice for harvesting personal information. Instead of directing you to a spoofed Web site, you'll receive an e-mail prompting you to call a customer support number. If you make the call, you'll be connected to a real person or receive an audio response requesting your account number, personal identification number and/or password — the personal data needed to initiate a successful identity theft.
— Al Winchell, "Phone Phishing latest technique to get your info," News-Press, August 1, 2005
Earliest Citation:
Many customers do not feel like typing their information into a secure shopping cart and want to make their orders using a cell phone. This is also a way to lose all of your personal info, as there are phishers who use ordinary police scanners to pick up cell phone calls beginning with the magic words, "I want to place an order."
— Sharon Freeman, "Phone Phishing," Forbes, October 18, 2004
Notes:
There are four main ways that phone phishers obtain a person's sensitive data:
• Call the person, pretending to be an employee of a company.
• Get the person to call a phone number controlled by the phisher.
• Call a company, pretending to be the person.
• Eavesdrop on the person's cell phone calls.
Related Words:
call laundering
cramming
crimeware
cybercasing
dot con artist
fat finger dialing
grandparent scam
identity theft
phishing
pretexting
puddle phishing
smishing
sock puppet
spear-phishing
vishing
Categories:
Privacy and Security
Cell Phones
Telephones
Crime

New words. 2013.