How to Report Scam Calls and Phishing Attacks


With incidents such as the Colonial Pipeline infection and the Kaseya supply chain attack making so many headlines these days, it can be easy to forget that malicious actors are still preying on individual users. They’re not using ransomware to do that so much anymore, though. Not since the rise of big game hunting, anyway. This term marks ransomware actors’ shift away from attacks against individual users and towards operations targeting large enterprises, noted CNBC. But attacks like phishing and scam calls are still an issue.


So, how are malicious actors preying upon individual users? Let’s discuss three kinds of attacks below.


Scam Phone Calls


According to the Federal Trade Commission (FTC), a scam phone call involves a malicious actor cold-calling victims to try to steal their personal information or financial details. They can then use that data to commit identity theft or to perform credit card fraud.


Attackers use various lures to trick their targets. Provided below are a few of the most common types:


Imposter scams – In this type of ruse, a scammer calls someone and pretends to be a person that the recipient trusts. They m ..

Support the originator by clicking the read the rest link below.