Sentrya logo Sentrya Get rid of spam

What is Vishing and How to Protect Youself

Added on: 22/10/2024 In today’s digital world, scammers are always evolving their tactics to deceive individuals, and one of the most alarming methods is “vishing.” This sophisticated attack preys on the trust and vulnerability of individuals by using voice calls to steal sensitive information, and it’s becoming increasingly common. But what exactly is vishing, and why is it so dangerous? More importantly, how can you protect yourself from these fraudsters?


What is Vishing?


Vishing, short for “voice phishing,” is a type of social engineering attack where criminals use voice calls to trick victims into divulging personal information, such as passwords, credit card details, or social security numbers. Just like email-based phishing attacks, vishing relies on creating a sense of urgency or fear in the victim, pushing them to act quickly without verifying the legitimacy of the request.

The attackers usually impersonate trusted institutions like banks, tech companies, government agencies, or even popular services such as Google or Microsoft. They might claim there’s a problem with your account, warn you about suspicious activity, or offer a refund, all to manipulate you into providing sensitive information over the phone. These calls can appear incredibly convincing, often using technologies like caller ID spoofing to make it seem like they’re calling from legitimate numbers.


The Dangers of Vishing


Vishing attacks can be highly damaging for several reasons:

1. Trust and Authority: Attackers often pose as representatives of legitimate organisations, making the victim more likely to trust them. They might even use the official phone numbers of banks, tech companies, or government agencies, creating a sense of authority that pushes the target to comply.
2. Real-Time Interaction: Unlike phishing emails, which can be flagged or ignored, vishing involves real-time interaction. This puts pressure on the victim to act immediately, often leaving little time for second thoughts or fact-checking.
3. Sensitive Information: Scammers are often after highly sensitive information, such as financial details, account login credentials, or even access to computer systems. In many cases, victims may not realise they’ve been scammed until after their accounts have been compromised, at which point it may be too late.
4. Emotional Manipulation: Vishing attackers often use emotional manipulation to scare their targets. They might claim that if the victim doesn’t act immediately, they could lose money, be fined, or face legal trouble. This fear-based approach is highly effective, particularly with vulnerable individuals, such as the elderly.


Real-Life Example: Spoofing Google’s Phone Number


One particularly alarming vishing technique involves scammers spoofing Google’s phone number and domain, making their attacks seem even more believable. Here’s how such a scam typically unfolds:

The victim is alerted that someone wants to access or has already accessed their Gmail account. The prompt is followed shorty by a phone call with Google’s legitimate number. On the phone, the victim will discuss with a “Google representative”, which in reality is just an AI voice following a script set by the scammer.

To make the situation more convincing, the scammer might refer the victim to a fake Google support website (which looks identical to the real one) to “verify” the details. They might ask the victim to confirm their account information, give out a one-time verification code, or even provide remote access to their device for “security” purposes. In this heightened state of fear, the victim may comply without thinking, effectively handing over full control of their account.

This type of vishing scam is particularly dangerous because of how closely it mimics a legitimate interaction with a trusted company. The attackers take advantage of the fact that Google is a company millions of people interact with every day, and most users are already wary of cybersecurity threats. By spoofing Google’s phone number and directing victims to a near-perfect replica of its website, scammers add a veneer of authenticity that makes it incredibly difficult to detect the fraud.


How to Protect Yourself from Vishing


Protecting yourself from vishing requires a combination of skepticism and practical steps:

1. Verify the Caller: If you receive an unexpected call from a company or organisation, don’t provide personal information right away. Hang up and call the official customer service number found on the company’s website to verify the legitimacy of the request.
2. Don’t Rely on Caller ID: Caller ID can be easily spoofed. Even if the number appears to be from a legitimate source, always double-check before giving away sensitive information.
3. Avoid Immediate Action: Scammers often create a sense of urgency. If a caller demands immediate action or asks for sensitive information, it’s a red flag. Take your time to verify the request.
4. Do Not Share Sensitive Information: Never share passwords, bank details, or one-time verification codes over the phone unless you’re absolutely sure who you’re speaking to.
5. Report Suspicious Calls: If you suspect you’ve received a vishing call, report it to the company the scammer was impersonating, as well as to your local fraud reporting agencies. This helps authorities track and mitigate these scams.


Vishing is a serious and growing threat in the digital age, with scammers using ever more convincing tactics to trick people into revealing sensitive information. By being aware of how vishing works, understanding the dangers, and following best practices for avoiding these scams, you can better protect yourself from falling victim to such attacks. Always stay vigilant, question unexpected calls, and prioritize your privacy and security above all.

Read more

How to Clean 80% of Spam in 2 Days in 2025

Personal data is the new gold, and as a result, scammers make bank by taking advantage of us — did you know that they made over $1 trillion from scams two years ago? That’s more than half of Canada’s GDP…<br/><br/>I’ve seen many people just give up their long-term email accounts just because it got filled with spam, scams and phishing emails — and it’s just sad. I don’t know about you, but I’m pretty emotional about my account I made almost 2 decades ago, and I really don’t want to lose it or just give up on it.<br/><br/>This is exactly what pushed my research for a permanent solution to get rid of all the junk from my inbox, and give my account a second chance to life - by the way, my next checklist is made strictly for Gmail (that’s what I’m using), so if you’re an Outlook, Yahoo or other type of user, this might not be for you.<br/><br/>Let me dive into what I discovered, how it works and how quickly it turned my inbox around.<br/><br/><br/><h2 class= "text-heading">What I discovered</h2><br/>My journey started about 15 years ago, when I used to get more spam than legit emails in my inbox, and it made me wonder why that happens. I didn’t know much at the time, so I got left with just the question.<br/>It wasn’t until 6 years ago when I got a job as a data entry assistant for a start-up operating in the data protection industry, and got introduced to this brand new world - that was my ‘Aha!’ moment. I learned a lot there, found what data is collected about us, consumers, by a lot of companies, how entitled many of them feel to do anything they want with our information, and how a large number of them “get back” at us when we try to distance ourselves from them.<br/>In simple terms, from the data they collect about us (name, email, phone number, shopping, browsing etc.), they can generate inferred data, like net worth, how much we’re worth to them as customers, and even predict future spending habits. In terms of “getting back” at us, many of them sell our information to others as soon as we unsubscribe from their marketing emails — this way they make up some of the loss resulted from their inability to market their products directly to us.<br/><br/><br/><h2 class= "text-heading">How it works (how I turned my inbox around)</h2><br/>It took me a good while to figure out how to get rid of spam and junk. I first started to look at how I can filter out these types of emails, but since even tech giants like Google or Microsoft haven’t figured it out, I clearly had no chance of doing it, especially by myself.<br/><br/>And then it clicked!<br/><br/>Instead of chasing after scammers, which use an email or domain as a one-time thing, where they send a bunch of scams once and switch to a different email/domain, I asked myself - what’s constant? Scammers or actual subscriptions?<br/><br/>I think it’s pretty obvious that subscriptions are constant for a lot of us. We may have hundreds of opened accounts, but in reality, we use only a handful.<br/><br/>So I started fiddling with some filters to see what would happen if I changed my inbox to accept emails only coming from a set list of senders. In 2 days, I got only 2 or 3 emails after I set up that filter.<br/><br/>This was my “holy sh*t” moment, and it changed my inbox ever since.<br/> I made this filter (along with some other things) into a digital product, but I want to share the “secrets” here with you, so you can get a better email experience, and avoid having to give up on it.<br/><br/>Here’s how to create a complete and comprehensive filter:<br/>- Make a list of services and subscriptions you still need, and are important to you (important in the next step)<br/>- Click on the filter icon in Gmail’s web app, and add the list you made in the “Doesn’t have” field using this format: {(from:sender1 OR from:sender2 OR from:sender3)}<br/>- Next, select the “Delete it” option. This way, all emails not included in your filter will be sent to trash, and permanently deleted in 30 days<br/><br/>The best thing about this is that it clears all unwanted emails (junk, spam, scams and phishing), and ensured you won’t miss new emails since they’ll just be sent to trash - you can then update the filter and add the new sender to it next.<br/><br/>Of course, this will you take you some time to do, but it’s not impossible or overwhelming.<br/><br/><br/>Now to the ‘selling’ part - I mentioned that I made this into a digital product called <a href= "https://sentrya.net" class= "content-link">sentrya.net</a>.<br/><br/>Sentrya is for privacy-conscious people who don’t want to spend hours manually searching for subscriptions and creating the filter I mentioned earlier. Basically, Sentrya does all the heavy lifting for you, saves you time and gives you peace of mind.<br/><br/>Here’s a short comparison between using Sentrya and doing it yourself:<br/><br/><u>Do it yourself:</u><br/>- It’ll take you a few hours gathering all (or almost all) subscriptions<br/>- You have to remember to look in your Trash folder every time a new sender emails you<br/>- You need to manually update the filter if you want to add a new sender to it<br/><br/><u>With Sentrya:</u><br/>- It takes about 10 minutes to see a list of active subscriptions<br/>- You select (mark as Important) the ones you need<br/>- Create the filter with a tap<br/>- Get notified when a new sender emails you<br/>- Update the filter with a tap<br/><em>This is available for free on Sentrya</em><br/>- Remove your information from unwanted subscriptions (to avoid data selling)<br/>- Remove your information from a lot of data brokers (avoid having spammers buying your data)<br/>- Find if and when your data appears on the dark web<br/><em>These are available under paid plans</em><br/><br/><br/>Thanks for reading all the way here, and I hope you found this article to be useful in saving your email account :)<br/><br/><br/><b>PS</b>: If you know someone on the brink of giving up on their email, send them this article and spare them the heartache of losing their account Read more

Your iPhone Data May Have Been Leaked in China:–Here is What It Means and How to Protect Yourself

Did you know that your iPhone data may have just been exposed? According to Cybernews, up to <b>62 million iPhone users’</b> personal information has been leaked from an iOS app in China. This includes details like your <em>name, ID number, gender, date of birth, phone number, province, and city</em> – basically, enough data for scammers to wreak havoc.<br/><br/>If you’re like most people, this probably feels like a punch to the gut. After all, you trust your iPhone and Apple to keep your data safe. Unfortunately, even the best technology can’t always protect you when shady apps or data brokers get involved.<br/><br/><br/><h2 class= "text-heading">Here’s What Was Leaked</h2><br/>Hackers managed to grab personal info that could let them impersonate you online or even in the real world. This data is fresh – as recent as February 2025 – so it’s especially worrying.<br/><br/><br/><h2 class= "text-heading"> Why Should You Care?</h2><br/>Think about all the ways your personal data is linked to your life:<br/>- <u>Identity theft</u> – Scammers could open bank accounts or credit lines in your name.<br/>- <u>Phishing attacks</u> – You might get emails or texts that look real but are traps.<br/>- <u>Financial fraud</u> – They could trick you into sending them money or personal info.<br/>- <u>Location-based scams</u> – Because they know where you live, they might tailor attacks just for you.<br/><br/><br/><h2 class= "text-heading">How to Protect Yourself</h2><br/>The best thing you can do <u>right now</u> is to start cleaning up your personal data footprint. Removing your info from data brokers and shady sites is crucial.<br/><br/>That’s where services like <a href= "https://sentrya.net" class= "content-link">Sentrya</a> come in. Sentrya helps you <em>find and delete your personal data</em> from data broker websites and search engines. It’s like taking your info back into your own hands – because the less data out there, the harder it is for criminals to target you.<br/><br/>Sentrya works by continuously scanning for your info and removing it from places where it shouldn’t be. It’s a smart move to help protect your privacy, especially after a major leak like this.<br/><br/><br/>If you’re an iPhone user – or just care about your privacy – don’t wait. This breach is a wake-up call that your personal data can be out there in ways you never imagined. <b>Act now</b> to lock down your information and stop hackers in their tracks. Read more

Morocco CNSS Data Breach: A Wake Up Call for Consumer Data Protection

In April 2025, Morocco experienced a significant cybersecurity incident when the National Social Security Fund (Caisse Nationale de Sécurité Sociale – CNSS) was compromised. The breach resulted in the unauthorised release of sensitive data pertaining to millions of Moroccan workers and hundreds of thousands of businesses. The fallout from this breach has raised serious concerns about consumer privacy and the adequacy of data protection measures.<br/><br/><br/><h2 class= "text-heading">The CNSS Breach: What Happened?</h2><br/>On April 8, 2025, a hacker group identifying itself as JabaRoot DZ claimed responsibility for the cyberattack on CNSS. The group leaked over 50,000 official documents, including personal identification numbers, salary declarations, employment contracts, and correspondence involving foreign diplomatic entities. The leaked data was disseminated through various channels, including encrypted messaging platforms and public file-sharing websites.<br/><br/>Cybersecurity analysts suggest that the attackers may have exploited vulnerabilities in outdated file storage protocols or gained access through compromised administrator accounts. The breach potentially began weeks or months before the data was released, allowing the attackers ample time to exfiltrate information undetected.<br/><br/><br/><h2 class= "text-heading">Implications for Consumer Privacy</h2><br/>The CNSS breach has exposed nearly 2 million employees and approximately 470,000 companies to potential risks, including identity theft, financial fraud, and targeted phishing attacks. The leaked information encompasses a wide range of personal and financial data, making it a valuable resource for malicious actors.<br/><br/>This incident underscores the vulnerabilities inherent in centralised data repositories and the critical need for robust cybersecurity measures to protect consumer information. It also highlights the importance of transparency and prompt communication from institutions in the event of data breaches.<br/><br/><br/><h2 class= "text-heading">Sentrya: Empowering Consumers to Protect Their Data</h2><br/>In the wake of such breaches, you must take proactive steps to safeguard your personal information. <a href= "https://sentrya.net" class= "content-link">Sentrya</a> offers a comprehensive solution designed specifically for individual users. Sentrya provides tools to remove personal data from the web and data brokers, and to clear inboxes of scams and phishing emails. By leveraging Sentrya’s services, you can regain control over your digital footprint and enhance your privacy.<br/><br/><br/>The CNSS data breach serves as a stark reminder of the growing threats to consumer privacy in the digital age. While institutions must bolster their cybersecurity frameworks, individuals also have a role to play in protecting their personal information. Utilising services like Sentrya can be an effective strategy for consumers to mitigate risks and maintain their privacy in an increasingly interconnected world. Read more

Trump Administration Reverses Data Privacy Protections Exposing Americans to Increased Risks

In a significant policy reversal, the Trump administration has dismantled a Biden-era initiative aimed at limiting the sale of Americans’ personal data by data brokers. This move raises substantial concerns about consumer privacy and national security.<br/><br/><br/><h2 class= "text-heading">Background: The Biden-Era Initiative</h2><br/>Under President Biden, the Consumer Financial Protection Bureau (CFPB) proposed regulations to subject data brokers to oversight akin to credit bureaus. The goal was to protect consumers from the unregulated sale of sensitive personal information, which could be exploited for identity theft, scams, and even national security threats.<br/><br/><br/><h2 class= "text-heading">The Reversal and Its Implications</h2><br/>On May 14, 2025, the CFPB announced the withdrawal of the proposed regulations, stating that they no longer align with the bureau’s policy objectives. Consumer advocacy groups, such as Consumer Reports, have expressed alarm, warning that this decision leaves consumers vulnerable to scams and identity theft.<br/><br/>The rollback also includes the withdrawal of proposals related to digital payment technologies and the prohibition of certain terms in consumer finance products.<br/><br/><br/><h2 class= "text-heading">Risks to Consumer Privacy</h2><br/>The unregulated sale of personal data poses several risks:<br/>• <u>Identity Theft</u>: Personal information can be used to impersonate individuals, leading to financial loss and reputational damage.<br/>• <u>Scams and Phishing</u>: Data brokers can sell information to malicious actors who craft targeted scams and phishing emails.<br/>• <u>National Security Threats</u>: Sensitive data about government officials and military personnel can be exploited by foreign adversaries for espionage.<br/><br/><br/><h2 class= "text-heading">Sentrya: A Consumer-Focused Solution</h2><br/>In light of these developments, consumers seeking to protect their personal information can turn to services like <a href= "https://sentrya.net" class= "content-link">Sentrya</a>. Sentrya offers tools to remove personal data from the web and data brokers, and to clear inboxes of scams and phishing emails. Designed specifically for individual consumers, Sentrya empowers users to take control of their digital privacy.<br/><br/><br/>The Trump administration’s decision to scrap proposed data privacy regulations underscores the importance of individual action in safeguarding personal information. While federal protections may be in flux, consumers can proactively protect themselves using services like <a href= "https://sentrya.net" class= "content-link">Sentrya</a> to mitigate the risks associated with data exposure. Read more
Sentrya logo Sentrya
Affiliates Register Terms Privacy
Made with ❤️ by Claudiu All rights reserved | Sentrya 2025
I'd like to set analytics cookies that help me make improvements by measuring how you use the site.