
Vishing is reckoned to let baddies collect details about three-digit security codes, expiration dates and other essential ID information - as well as card and account numbers.
Of course, you'd never be fooled this way but what Secure Computing's VP of strategic accounts Paul Henry says is that,
According to Secure Computing, baddies configure a "war dialler" that dials up numbers in a given region and the following typically happens when a call is answered,
* When that number is called, it is answered by a typical computer-generated voice, saying the consumer has reached account-verification and requesting that the card's 16-digit number be input on the phone's key pad
* Once the card number is entered, the visher has all of the information necessary (telephone number, full name and address by a reverse phone-number look-up) to place fraudulent charges on the card
* The call can then be used to harvest additional details such as security PIN, expiry date, date of birth, bank account number and more
Henry reckons that “Common sense is the first line of protection” and that “Anyone who is called by a bank should take the appropriate steps to protect their personal information and their bank account.” But how can you prevent yourself becoming a victim? Well, you have to think before acting and realise that,
* It is important never to call a telephone number provided in a phone call or an e-mail regarding possible security issues with any credit card or bank account. Only the phone number on the back of your credit card or on your bank statement should be called to report the matter. If the call was legitimate, your credit card company or bank will have a record and will be able to assist.
* If anyone calls purporting to be a credit card provider and requests the CCV, immediately hang up and call the phone number on the back of the credit card and report the attempt. Again, if the call was legitimate, the credit card provider will have knowledge of it.
HEXUS.links
HEXUS.community - discussion thread about this article
Secure Computing - home page