SlideShare a Scribd company logo
1 of 13
Download to read offline
S U B M I T T E D B Y
G O P I K A G O PA N
M S C . FA F I
R A S H T R I YA R A K S H A U N I V E R S I T Y
CELL PHONE FRAUD
CELL
PHONE
FRAUDS
DEFINITION
• It is an act of fraud in which unauthorized use, tampering
or manipulation of a cellular phone or service.
• Mobile phone fraud involves a variety of scams that either
persuade you to buy phone-related products/services
that turn out to be substandard or non-existent; or to
make phone calls or texts to premium services by
accident; or to unknowingly sign up to expensive
subscription services.
• People find it difficult to stay without their mobile phones
even for a split second. So much so that the addiction to
mobile phones has led to a new form of a mental disorder
called ‘Nomophobia’
• Wireless Telephone Protection Act of 1998 expanded
prior law to criminalize the use, possession, manufacture
or sale of cloning hardware or software.
Based on the results of a March 2021 survey, call-
security app maker Truecaller estimates that
Americans lost $29.8 billion to phone scams in the
previous 12 months, up from $19.7 billion a year
earlier. Some 59 million Americans lost money to a
phone scam during that period, according to the
report, with the average cost jumping 43 percent,
from $351 to $502.
LATEST
REPORT
NEWS
SHEET
1. Fraud against user by phone
companies
2. Fraud against user by third
parties
3. Fraud against phone companies
by users or third parties
TYPES OF CELL
PHONE FRAUD
FRAUDAGAINSTUSERBYPHONECOMPANIES
1. CRAMMING : Addition of charges to a subscriber's telephone bill for
services
2. SLAMMING : Subscriber's telephone service is changed without their
consent
3. FALSE ANSWER SUPERVISION : VoIP fraud where the billed duration for
the caller is more than the duration of the actual connection duration.
The FAS fraud can be implemented in a softswitch in many different ways.
▪ False billing of party A without calling a party B
▪ Start of billing before actual answer of party B
▪ Extra billing after disconnection of party B
FRAUDAGAINSTUSERBYTHIRDPARTIES
1.SIM SWAPPING : Criminals use SIM cards linked to your phone to steal access to your phone number and carrier account.
By having your cell number, a scammer could trick caller ID systems and get into your financial accounts or call financial
institutions that use your phone number to identify you.
2. SUBSCRIBER FRAUD occurs when someone signs up for service with fraudulently obtained customer information or false
identification. Lawbreakers obtain your personal information and use it to set up a cell phone account in your name. Resolving
subscriber fraud could develop into a long and difficult process for victims. It may take time to discover that subscriber fraud
has occurred and an even longer time to prove that you did not incur the debts.
3.MOBILE PHONE TEXT SCAMS : Fake text messages from banks are one of the most common types of mobile phone text
scams. Such messages look like they have been sent from a bank. Users are prompted to call the number provided in the SMS
or visit a website. Once that is done, hackers may gain access to your financial details or other sensitive personal information.
4.MISSED CALL SCAMS OR ONE-RING SCAMS OR WANGIRI : Fraudsters call multiple
random numbers per hour through automatic dialers. The call is usually set to ring
just once. When victims return the call, they are usually connected to a paid
international hotline for adult entertainment. While some victims immediately
disengage from further communication, some stay hooked for longer. This costs them
an exorbitant amount once they disconnect.
5. PHONE VISHING : Vishing, also known as, "voice phishing" involves cell phone scam
calls that urge you to take action — normally by calling you or leaving a voicemail.
Vishing involves scammers trying to impersonate an authentic person or organization
to gain your trust. They may pose as part of an official company or government
service, convincing you that you must provide personal information or money.
6. SMS PHISHING: SMS phishing, also known as “smishing”, involves a scammer
getting you to act via text message. Malware SMS links can be sent in these messages,
and if you open the link, your device can become infected with malware or spyware.
1. PHREAKING : Fraudulent manipulation of
telephone signaling in order to make free phone
calls.
2. PHONE CLONING has been used as a means of
copying both the electronic serial number and the
telephone number of another subscriber's phone to
a second (cloned) phone.
FRAUDAGAINSTPHONE
COMPANIESBYUSERSOR
THIRDPARTIES
HowTo
Recognize
aPhone
Scam
Phone
Scam
❖ Use a virtual private network (VPN) on public
Wi-Fi
❖ Create highly secure passwords
❖ Create extended-length PINs
❖ Store your unique passwords in a secure
online vault
❖ Credible giveaways don’t ask for a fee
❖ Use a call blocking app
❖ Do not interact and hang up
❖ Only use official apps for services
❖ Watch your phone bill
❖ Get cybersecurity on your phone
PREVENTIVE
MEASURES
REFERENCE
1 . C e l l - p h o n e - f r a u d . p d f . ( n . d . ) . R e t r i e v e d D e c e m b e r 1 1 , 2 0 2 1 ,
f r o m h t t p s : / / s a p u t o . l a w / w p - c o n t e n t / u p l o a d s / 2 0 1 5 / 1 1 / c e l l - p h o n e -
f r a u d . p d f
2 . M o b i l e p h o n e f r a u d . ( n . d . ) . A c t i o n F r a u d . R e t r i e v e d D e c e m b e r
1 1 , 2 0 2 1 , f r o m h t t p s : / / w w w. a c t i o n f r a u d . p o l i c e . u k / a - z - o f -
f r a u d / m o b i l e - p h o n e - f r a u d
3 . M o b i l e S c a m s H o w t o I d e n t i f y T h e m a n d P r o t e c t Yo u r s e l f .
( n . d . ) . R e t r i e v e d D e c e m b e r 1 1 , 2 0 2 1 , f r o m
h t t p s : / / u s . n o r t o n . c o m / i n t e r n e t s e c u r i t y - m o b i l e - m o b i l e - s c a m s -
h o w - t o - i d e n t i f y - t h e m - a n d - p r o t e c t - y o u r s e l f . h t m l
4 . To p M o b i l e P h o n e S c a m s – Ti p s o n H o w t o Av o i d M o b i l e S c a m s .
( n . d . ) . R e t r i e v e d D e c e m b e r 1 1 , 2 0 2 1 , f r o m h t t p s : / / i f f l a b . o r g / t o p -
m o b i l e - p h o n e - s c a m s - h o w - t o - a v o i d - m o b i l e - s c a m s /
5 . Wo n g , K . ( 1 9 9 6 ) . M o b i l e p h o n e f r a u d — A r e G S M n e t w o r k s
s e c u r e ? C o m p u t e r F r a u d & S e c u r i t y, 1 9 9 6 ( 1 1 ) , 1 1 – 1 8 .
h t t p s : / / d o i . o r g / 1 0 . 1 0 1 6 / 1 3 6 1 - 3 7 2 3 ( 9 6 ) 8 8 9 3 1 - 7
6 . K y l , J . ( 1 9 9 8 , A p r i l 2 4 ) . S . 4 9 3 - 1 0 5 t h C o n g r e s s ( 1 9 9 7 - 1 9 9 8 ) :
Wi r e l e s s Te l e p h o n e P r o t e c t i o n A c t ( 1 9 9 7 / 1 9 9 8 ) [ L e g i s l a t i o n ] .
h t t p s : / / w w w. c o n g r e s s . g o v / b i l l / 1 0 5 t h - c o n g r e s s / s e n a t e - b i l l / 4 9 3
Cell phone fraud

More Related Content

Similar to Cell phone fraud

GET - AR Timeline for Action
GET - AR Timeline for ActionGET - AR Timeline for Action
GET - AR Timeline for Action
Michael Wirscham
 

Similar to Cell phone fraud (20)

Analysis of Regional Phishing Attack
Analysis of Regional Phishing AttackAnalysis of Regional Phishing Attack
Analysis of Regional Phishing Attack
 
Decision - wyeth v. weeks (supreme court of alabama)
Decision  - wyeth v. weeks (supreme court of alabama)Decision  - wyeth v. weeks (supreme court of alabama)
Decision - wyeth v. weeks (supreme court of alabama)
 
COVID-19 are a cloud security catalyst
COVID-19 are a cloud security catalystCOVID-19 are a cloud security catalyst
COVID-19 are a cloud security catalyst
 
M2 works
M2 worksM2 works
M2 works
 
ELD Compliance Timeline for 2017 and 2018
ELD Compliance Timeline for 2017 and 2018ELD Compliance Timeline for 2017 and 2018
ELD Compliance Timeline for 2017 and 2018
 
Hemisphere Database
Hemisphere DatabaseHemisphere Database
Hemisphere Database
 
Lata construction v. dr. ramniklal shah
Lata construction v. dr. ramniklal shahLata construction v. dr. ramniklal shah
Lata construction v. dr. ramniklal shah
 
Santander Presentation - Global Digital Innovation
Santander Presentation - Global Digital InnovationSantander Presentation - Global Digital Innovation
Santander Presentation - Global Digital Innovation
 
The evolution of the internet
The evolution of the internetThe evolution of the internet
The evolution of the internet
 
(2nd edition) tellows magazine
(2nd edition) tellows magazine(2nd edition) tellows magazine
(2nd edition) tellows magazine
 
Progress Report Mob Securer (Android App)
Progress Report Mob Securer (Android App)Progress Report Mob Securer (Android App)
Progress Report Mob Securer (Android App)
 
Stolen and Lost Wireless Devices
Stolen and Lost Wireless DevicesStolen and Lost Wireless Devices
Stolen and Lost Wireless Devices
 
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACION
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACIONFiltración de contraseñas y correos: PROTOCOLO EXFILTRACION
Filtración de contraseñas y correos: PROTOCOLO EXFILTRACION
 
Personal Security for High Profile and High Wealth Individuals
Personal Security for High Profile and High Wealth IndividualsPersonal Security for High Profile and High Wealth Individuals
Personal Security for High Profile and High Wealth Individuals
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing research
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing research
 
Affects of Media on the Mind
Affects of Media on the MindAffects of Media on the Mind
Affects of Media on the Mind
 
GET - AR Timeline for Action
GET - AR Timeline for ActionGET - AR Timeline for Action
GET - AR Timeline for Action
 
Safe Banking Act 2019: What You Need To Know!
Safe Banking Act 2019:  What You Need To Know!Safe Banking Act 2019:  What You Need To Know!
Safe Banking Act 2019: What You Need To Know!
 
Customer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfCustomer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdf
 

Recently uploaded

一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样
一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样
一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样
AS
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
hfkmxufye
 
一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书
A
 
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
Fir
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
AS
 
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
AS
 
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
AS
 
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
AS
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理
A
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
AS
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
c6eb683559b3
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
apekaom
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
AS
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
SS
 

Recently uploaded (20)

一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样
一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样
一比一原版(Design毕业证书)新加坡科技设计大学毕业证原件一模一样
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
 
一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书
 
Dan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat HoodieDan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat Hoodie
 
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证学位证书
 
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
 
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 

Cell phone fraud

  • 1. S U B M I T T E D B Y G O P I K A G O PA N M S C . FA F I R A S H T R I YA R A K S H A U N I V E R S I T Y CELL PHONE FRAUD
  • 2. CELL PHONE FRAUDS DEFINITION • It is an act of fraud in which unauthorized use, tampering or manipulation of a cellular phone or service. • Mobile phone fraud involves a variety of scams that either persuade you to buy phone-related products/services that turn out to be substandard or non-existent; or to make phone calls or texts to premium services by accident; or to unknowingly sign up to expensive subscription services. • People find it difficult to stay without their mobile phones even for a split second. So much so that the addiction to mobile phones has led to a new form of a mental disorder called ‘Nomophobia’ • Wireless Telephone Protection Act of 1998 expanded prior law to criminalize the use, possession, manufacture or sale of cloning hardware or software.
  • 3. Based on the results of a March 2021 survey, call- security app maker Truecaller estimates that Americans lost $29.8 billion to phone scams in the previous 12 months, up from $19.7 billion a year earlier. Some 59 million Americans lost money to a phone scam during that period, according to the report, with the average cost jumping 43 percent, from $351 to $502. LATEST REPORT
  • 5. 1. Fraud against user by phone companies 2. Fraud against user by third parties 3. Fraud against phone companies by users or third parties TYPES OF CELL PHONE FRAUD
  • 6. FRAUDAGAINSTUSERBYPHONECOMPANIES 1. CRAMMING : Addition of charges to a subscriber's telephone bill for services 2. SLAMMING : Subscriber's telephone service is changed without their consent 3. FALSE ANSWER SUPERVISION : VoIP fraud where the billed duration for the caller is more than the duration of the actual connection duration. The FAS fraud can be implemented in a softswitch in many different ways. ▪ False billing of party A without calling a party B ▪ Start of billing before actual answer of party B ▪ Extra billing after disconnection of party B
  • 7. FRAUDAGAINSTUSERBYTHIRDPARTIES 1.SIM SWAPPING : Criminals use SIM cards linked to your phone to steal access to your phone number and carrier account. By having your cell number, a scammer could trick caller ID systems and get into your financial accounts or call financial institutions that use your phone number to identify you. 2. SUBSCRIBER FRAUD occurs when someone signs up for service with fraudulently obtained customer information or false identification. Lawbreakers obtain your personal information and use it to set up a cell phone account in your name. Resolving subscriber fraud could develop into a long and difficult process for victims. It may take time to discover that subscriber fraud has occurred and an even longer time to prove that you did not incur the debts. 3.MOBILE PHONE TEXT SCAMS : Fake text messages from banks are one of the most common types of mobile phone text scams. Such messages look like they have been sent from a bank. Users are prompted to call the number provided in the SMS or visit a website. Once that is done, hackers may gain access to your financial details or other sensitive personal information.
  • 8. 4.MISSED CALL SCAMS OR ONE-RING SCAMS OR WANGIRI : Fraudsters call multiple random numbers per hour through automatic dialers. The call is usually set to ring just once. When victims return the call, they are usually connected to a paid international hotline for adult entertainment. While some victims immediately disengage from further communication, some stay hooked for longer. This costs them an exorbitant amount once they disconnect. 5. PHONE VISHING : Vishing, also known as, "voice phishing" involves cell phone scam calls that urge you to take action — normally by calling you or leaving a voicemail. Vishing involves scammers trying to impersonate an authentic person or organization to gain your trust. They may pose as part of an official company or government service, convincing you that you must provide personal information or money. 6. SMS PHISHING: SMS phishing, also known as “smishing”, involves a scammer getting you to act via text message. Malware SMS links can be sent in these messages, and if you open the link, your device can become infected with malware or spyware.
  • 9. 1. PHREAKING : Fraudulent manipulation of telephone signaling in order to make free phone calls. 2. PHONE CLONING has been used as a means of copying both the electronic serial number and the telephone number of another subscriber's phone to a second (cloned) phone. FRAUDAGAINSTPHONE COMPANIESBYUSERSOR THIRDPARTIES
  • 11. ❖ Use a virtual private network (VPN) on public Wi-Fi ❖ Create highly secure passwords ❖ Create extended-length PINs ❖ Store your unique passwords in a secure online vault ❖ Credible giveaways don’t ask for a fee ❖ Use a call blocking app ❖ Do not interact and hang up ❖ Only use official apps for services ❖ Watch your phone bill ❖ Get cybersecurity on your phone PREVENTIVE MEASURES
  • 12. REFERENCE 1 . C e l l - p h o n e - f r a u d . p d f . ( n . d . ) . R e t r i e v e d D e c e m b e r 1 1 , 2 0 2 1 , f r o m h t t p s : / / s a p u t o . l a w / w p - c o n t e n t / u p l o a d s / 2 0 1 5 / 1 1 / c e l l - p h o n e - f r a u d . p d f 2 . M o b i l e p h o n e f r a u d . ( n . d . ) . A c t i o n F r a u d . R e t r i e v e d D e c e m b e r 1 1 , 2 0 2 1 , f r o m h t t p s : / / w w w. a c t i o n f r a u d . p o l i c e . u k / a - z - o f - f r a u d / m o b i l e - p h o n e - f r a u d 3 . M o b i l e S c a m s H o w t o I d e n t i f y T h e m a n d P r o t e c t Yo u r s e l f . ( n . d . ) . R e t r i e v e d D e c e m b e r 1 1 , 2 0 2 1 , f r o m h t t p s : / / u s . n o r t o n . c o m / i n t e r n e t s e c u r i t y - m o b i l e - m o b i l e - s c a m s - h o w - t o - i d e n t i f y - t h e m - a n d - p r o t e c t - y o u r s e l f . h t m l 4 . To p M o b i l e P h o n e S c a m s – Ti p s o n H o w t o Av o i d M o b i l e S c a m s . ( n . d . ) . R e t r i e v e d D e c e m b e r 1 1 , 2 0 2 1 , f r o m h t t p s : / / i f f l a b . o r g / t o p - m o b i l e - p h o n e - s c a m s - h o w - t o - a v o i d - m o b i l e - s c a m s / 5 . Wo n g , K . ( 1 9 9 6 ) . M o b i l e p h o n e f r a u d — A r e G S M n e t w o r k s s e c u r e ? C o m p u t e r F r a u d & S e c u r i t y, 1 9 9 6 ( 1 1 ) , 1 1 – 1 8 . h t t p s : / / d o i . o r g / 1 0 . 1 0 1 6 / 1 3 6 1 - 3 7 2 3 ( 9 6 ) 8 8 9 3 1 - 7 6 . K y l , J . ( 1 9 9 8 , A p r i l 2 4 ) . S . 4 9 3 - 1 0 5 t h C o n g r e s s ( 1 9 9 7 - 1 9 9 8 ) : Wi r e l e s s Te l e p h o n e P r o t e c t i o n A c t ( 1 9 9 7 / 1 9 9 8 ) [ L e g i s l a t i o n ] . h t t p s : / / w w w. c o n g r e s s . g o v / b i l l / 1 0 5 t h - c o n g r e s s / s e n a t e - b i l l / 4 9 3