Mobile Scams: How-to Identify Them and Protect Yourself (2024)

Author: Nadia_Kovacs30 Employee Posted: 03-Oct-2014 | 12:38PM · Edited: 14-Apr-2015 | 2:48PM · 0 Comments · Translation:

  • 日本語

Mobile Scams: How-to Identify Them and Protect Yourself (1)

October is National Cyber Security Awareness month.Identity Theft is one of the most dangerous threats on the Internet Landscape. If a cybercriminal gains access to your financial information, it can be a potentialcatastrophe. Here we outline how you can keep your personal data protected from prying eyes. This is part 6 in a series of blog posts we will be publishing on various topics aimed at educating you on how to stay protected on today’s Internet landscape.

According to CNN.com, 55% of the Internet’s traffic is from mobile devices. This makes mobile users just as much of a target as computer users. Mobile scams and malware are on the rise, and scammers are evolving to get smarter at tricking you into giving up your data. Here we outline the many different types of mobile scams and the best ways you can identify them and keep your data safe.

Malware Apps

With copycat apps growing on official app stores, it’s harder than ever to know whether an app you’re downloading is genuine. Outside of the big, trusted names, how do you know if an unknown developer with few reviews is really making useful apps, or simply building vehicles for getting malware onto your smartphone?

Ways You Can Spot A Fake Mobile App:

  • Do some research. Even if the developer seems to have few reviews or very little downloads, they could just be starting out. On the other hand, they can be a scammer intent on tricking you into downloading the app. Perform and Internet search on the app and the developer. Most legitimate developers will have a website that showcases the app and any additional apps that company has made.
  • Read what reviews of the app that are available. If they seem short and nondescript, chances are, it is a scam. Additionally, there could also be reviews from users that were previously duped by that app.
  • Notice the details. Are the images of the app professional? Good design indicates a good app. Oftentimes scammers are in a rush and just throwing images together. Look for mismatched fonts, misspellings and non-symmetrical placement of logos and images.
  • Are there thorough explanations and details of what the app does? Legitimate app developers will usually write out a good explanation of instructions and features of the app.
  • Many fake apps will create clones of popular established apps. Examine the name of the developer to see if it matches up with the app. Note the amount of reviews- hugely popular apps will have hundreds, if not thousands of user reviews.

To add an extra layer of reassurance when browsing for new apps, download Norton Mobile Securityand use it to scan new apps before you run them – you might be surprised what you find out.

Social Media Spam

If you’re on Twitter you’ll know how annoying it is to be followed by a garbled name with zero followers, and to then receive a tweet with little more than a link. And Facebook is full of fake profiles, some of which have innocent intentions, but most are there to provide fake Likes on demand – or to spam genuine users with phishing links. However convincing a message may be, never click on a link sent by a stranger. Even if it seems harmless enough at the time, you could end up either giving your valuable personal details to a criminal, or – worse – have malware inserted onto your mobile.

SMS Phishing (Smishing)

The same applies over old-fashioned SMS, with messages arriving from unknown numbers urging you to reply to a number or to click on a link and open it in your phone’s browser. Again, doing so may be harmless, but will more likely insert malware onto your phone – or at least alert scammers to the fact that your number is active and worth targeting again.

These scams can present themselves in many forms. Usually in some form of a misleading offer such as “free” ringtones, sweepstakes offers, something that sounds too good to be true, or a pressing matter from your bank or financial institution.

With ringtone scams, there are a few ways the scammers can get you. Sometimes those “free” ringtones can be an actual subscription service, and if you respond you can be unknowingly signed up for the service. Other times, they can come embedded with malware. To be safe, only get your ringtones from reputable sources such as the Google Play Store or the iTunes Store.

SMS phishing will use some sort of scare tactic to get you to reply quickly without much time to think about the action. When in the form of a notice from a bank or financial institution, the phisher will request immediate action or your account will be closed. If you feel that your accounts are in danger, look up the company’s customer service phone number online and call them to verify the text.

How to stay safe:

  • Use caution when clicking on links sent to you via SMS when coming from unknown senders. You can always Google the sender’s phone number and if it is a scam, there will be multiple reports of the scam online.
  • Don’t respond to text messages from numbers that are not complete cell phone numbers (Such as 5000). These kinds of messages are from email to text services, which are popular amongst scammers.
  • Don’t respond to text messages without verifying who the sender is (again, Google is your friend in this case).
  • Don’t call a phone number from an unknown text. This can incur high charges on your phone bill that you won’t be aware of.
  • Use caution on free offers or notifications of winning a prize. If the offer sounds too good to be true, it probably is.

Vishing

Voice phishing – or vishing – has a human element, and it takes many forms. A scammer might call pretending to be your bank, ask for your security details and PIN number, and inform you that your card has been compromised and a courier will be arriving soon with a replacement. Of course, the replacement is a fake, and the scammer gets away with your genuine card and security details. Even without the physical element, simple voice phishing for login details is common, and surprisingly effective. Your bank will never ask for your PIN, so never give it to anyone that does ask. If you do receive an unexpected call from your bank, tell them you’ll call them back before giving any security details.

One Ring Scams
With this scam, the scammer will call once and hang up, with the objective of luring you into calling the number back. These numbers can be high toll lines, and by calling them you can end up paying a premium rate for the phone call.

Although mobile malware is on the rise, you can keep yourself protected by being smart about what actions you perform on your phone. The first line of defense against cyber attacks is the user. Educate yourself by utilizing the tips mentioned in this article. In addition to knowledge, you can add an extra layer of protection to your phone by installing Norton Security, which can help protect you against the endless amount of threats on the mobile Internet landscape.

This is part 6 of a series of blogs forNational Cyber Security Awareness Month.

For more information on various topics, check out:

Week 1
5 Ways You Didn't Know You Could Get a Virus, Malware, or Your Social Account Hacked
How To Choose a Secure Password
How To Avoid Identity Theft Online
How To Protect Yourself From Phishing Scams
How To Protect Yourself From Cyberstalkers

Week 2
Exactly How Free Is That Free App?
BYOD And Protecting Your Mobile Workforce
Cyber Security Concerns and Smartphones

Week 3
Keeping Your Mobile Fitness Data Secure
Security Concerns and the Connected Car
The Connected Home- Just How Safe Is Convenience?

Week 4
Securing Employee Technology, Step by Step
Are Your Vendors Putting Your Company’s Data at Risk?
Four Mobile Threats that May Surprise You
Theft-Proof Your Mobile Data
Traveling? Don’t Let Your Mobile Data Stray

Week 5
How Do Cybercriminals Get Caught?

Mobile Scams: How-to Identify Them and Protect Yourself (2024)

FAQs

Mobile Scams: How-to Identify Them and Protect Yourself? ›

Interacting in any way might encourage more calls. Avoid pressing numbers to navigate automated menus and not respond to live personnel if you think it's a scam. Simply hang up and consider doing your own research on the claim if you are curious. Only use official apps for services.

How to protect yourself against phone scams? ›

Interacting in any way might encourage more calls. Avoid pressing numbers to navigate automated menus and not respond to live personnel if you think it's a scam. Simply hang up and consider doing your own research on the claim if you are curious. Only use official apps for services.

How do you protect yourself if you think you have been scammed? ›

You think a scammer has stolen your personal information

Complete a report through ReportCyber. Make yourself a harder target: Secure your social media and other personal accounts, such as your email. Change the passwords to any other accounts you think the scammer may have accessed, or to which they now have access.

What damage can a scammer do with your phone number? ›

Scammers can use your phone number to obtain private information about you and then blackmail you into paying them so they won't release it. Scam others online with Google Voice. If a scammer has access to your phone or text messages, they may be able to set up an account through Google Voice to scam more people.

How do you know if you are chatting with a scammer? ›

You might be dealing with an online scammer if they request sensitive personal information, money, or insist on speaking on a chat app of their choice. You might be dealing with an online scammer if they request sensitive personal information, money, or insist on speaking on a chat app of their choice.

Can scammer get info from answering my phone? ›

Although cybercriminals cannot steal your information just by you answering a spam call, you should still avoid answering them to prevent them from targeting you more and falling for their scams.

What not to do when you get scammed? ›

STOP CONTACT WITH THE SCAMMER.

Hang up the phone. Do not reply to emails, messages, or letters that the scammer sends. Do not make any more payments to the scammer. Beware of additional scammers who may contact you claiming they can help you get your lost money back.

Can someone hack my bank account with my phone number? ›

A phone number alone is not enough for someone to hack your bank account. But, as outlined above with regard to someone having your email address, someone with your phone number could potentially call or text you as part of a phishing scam with the ultimate aim of hacking money from your accounts.

Can someone hack your phone with just your phone number? ›

Can someone hack my phone from my number? You cannot directly hack a phone through a phone number, but it can be used as part of a social engineering attack, such as a SIM swap ploy or vishing attack. Still, even these techniques require more information or steps beyond just knowing your phone number.

How do I protect the elderly from phone scams? ›

Protect your electronic accounts by keeping the security software on your computer and smartphone up to date and by using multifactor authentication when possible. Don't transfer money to strangers or to someone over the phone. Similarly, never buy a gift card to pay someone over the phone.

References

Top Articles
Latest Posts
Article information

Author: Prof. An Powlowski

Last Updated:

Views: 6167

Rating: 4.3 / 5 (44 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Prof. An Powlowski

Birthday: 1992-09-29

Address: Apt. 994 8891 Orval Hill, Brittnyburgh, AZ 41023-0398

Phone: +26417467956738

Job: District Marketing Strategist

Hobby: Embroidery, Bodybuilding, Motor sports, Amateur radio, Wood carving, Whittling, Air sports

Introduction: My name is Prof. An Powlowski, I am a charming, helpful, attractive, good, graceful, thoughtful, vast person who loves writing and wants to share my knowledge and understanding with you.