Close this search box.

Podcast: Voice and Text Phishing

Vivian Lee

Episode Summary

What are vishing and smishing? Simplified, vishing is voice phishing and smishing is text phishing. Phishing is when scammers or attackers attempt to trick users into revealing sensitive information, sending money, or installing malware. So how does this affect your business? Art Ocain and Fayon Atkinson from Corvus Insurance discuss some common techniques scammers use, how AI has changed the techniques, and how you can protect yourself and your businesses.

Voice and Text Phishing Techniques

Voice Phishing

  • Tech Support Scams: Scammers pretend to be tech support personnel, convincing victims to grant remote access, leading to malware installation or data theft.
  • Bank or Government Impersonation: Using caller ID spoofing and impersonation, imposters claim to be from banks, asking for account details and PINs to steal money. Fraudsters may also pose as IRS/FBI agents or debt collectors, demanding money or personal information under the guise of unpaid taxes or pending legal actions. These scams may request payment through gift cards or cryptocurrency,
  • Kidnapping Scams: Imposters may call and claim to be holding a loved one hostage and demand a ransom, usually completed through cryptocurrency or wire. They may use AI to mimic your loved ones voice as well to make it more convincing.

Text Phishing

  • Cryptocurrency Scams: Victims receive messages all in Chinese or claiming wrong number texts that will shift the conversation to cryptocurrencies, enticing the victims to share personal information or invest in fake ventures.
  • Sextortion Scams: Scammers claim to possess compromising content and demand payment to prevent its release.
  • Fake Notifications and Alerts: Fraudulent messages imitate legitimate services, like UPS deliveries, bank alerts, or tech support, leading recipients to click links or divulge personal/financial information.

AI Evolutions

With the integration of AI, voice and text phishing have become more sophisticated. Chatbots can engage in convincing conversations, making it challenging to differentiate between real and fraudulent interactions. Voice synthesis technology can imitate human voices remarkably well, making caller identification even more challenging. AI can also be used to create dangerous codes and links to steal information if opened. In other words, scammers are using AI to get smarter, stronger, and more dangerous.

Voice and Text Phishing on Businesses

Voice and text phishing can wreak havoc on businesses too. Here are some scenarios to watch for:

  • Fake Vendor Calls: Fraudsters impersonate vendors, seeking payment updates.
  • Impersonation of Higher-Ups: Scammers pose as executives to extract sensitive data.
  • Tech Support Targeting Employees: Calls that trick staff into sharing login credentials.

To mitigate this, it is highly recommended that business invest into staff training and security protocols for verifying sensitive data requests.

Recognizing and Protecting Against Voice and Text Phishing

To protect yourself, look out for these warning signs:

  • Unusual Sender Addresses or URLs: Carefully examine email addresses and links for any anomalies.
  • Uncharacteristic Requests: Be cautious of messages requesting personal, financial, or confidential information.
  • Emphasis on Immediate Action: Scammers often create urgency, pressuring victims to act quickly.

If you suspect phishing or have been phished:

  • Change your passwords and monitor your accounts for suspicious activity.
  • Contact your bank, credit card company, or relevant authorities immediately.
  • If connected to your work accounts, immediately report the situation to your company IT
  • You can also report phishing to the Federal Trade Commission.

Vigilance is key for protecting yourself and your business from voice and text phishing attempts. The world of voice and text phishing is evolving rapidly, and scammers are leveraging AI to create more convincing scams. Recognizing the red flags and staying informed are critical steps in safeguarding yourself and your business.

Video Version

Listen to more episodes at, on SpotifyApple Podcasts, Google PodcastsAmazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Cyber Insurance vs Cyber Threats

Cyber insurance is no substitute for prevention, but it should still be treated as a preventative step, often a step (or several steps) behind zero-day threats. What Does Cyber Insurance Cover? After a ransomware outbreak, it’s common to think, “insura
Avatar photo
Jared Sholley
>>Read More

Add a Date Picker to your Word Document

To add a Date Picker (a clickable calendar) to your document, from the Developer tab, click the Date Picker Content Control in the Controls group. If the Developer tab is not displayed in the Ribbon, turn it on by clicking File, Options, Customize Ribb
Jess Watters
Jessica Watters
>>Read More

Patching in VMware

  VMware is Frequent Attack Target Cybercriminals have been targeting VMware and vCenter more than ever, exploiting newly discovered vulnerabilities with ease. Without high availability redundancies in place to facilitate patching, organizations c
Avatar photo
Art Ocain
>>Read More