• Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    • Advertise With Us
  • Business
  • Education
  • Technology
  • Gaming
  • Computing
  • Lifestyle
  • Health
  • Internet
Facebook Twitter Instagram
Tech Feast
  • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    • Advertise With Us
  • Business
  • Education
  • Technology
  • Gaming
  • Computing
  • Lifestyle
  • Health
  • Internet
Facebook Twitter Instagram
Tech Feast
Home»Technology»Online Phishing Scams Escalating to Mobile Technology

Online Phishing Scams Escalating to Mobile Technology

HarrisonBy HarrisonFebruary 21, 2023 Technology
Facebook Twitter Pinterest Tumblr Email Reddit WhatsApp
Share
Facebook Twitter LinkedIn Pinterest Email Tumblr Reddit WhatsApp

Phishing scams continue to increase the world over, and South Africans are falling prey to them at an alarming rate. Recently South Africa same day cash provider Wonga acted in quick response to complaints from a small percentage of customers, by implementing a live hotline where consumers can report suspicious emails and potential online fraud.

Online Phishing Scams Escalating to Mobile Technology

Online phishing scams
Online phishing scams

With the advent of the Smartphone, more of us are accessing the internet from devices we carry around with us in our pockets. Mobile devices provide convenience in today’s fast-paced life, and as Smartphones become more powerful we’ll undoubtedly use them for more and more tasks. However, we sometimes forget they can store vast amounts of personal information and we need to be vigilant to protect ourselves.

According to Vodacom, cell-phones are generally secure as long as simple safety measures are observed. The most obvious precautions are to physically keep the device near to you and to enable PIN-code protection. When using your Smartphone, exercise the same kind of caution as you would with your PC and steer clear of dodgy internet links, especially those that come via SMS.

Tracking devices and information stored on our mobile devices mean that others can get to know a lot about us, our location and what we’re doing. Governments, for example, use our personal information regularly. In South Africa, the government’s right to access to a customer’s basic information is governed by several statutes.

There’s Rica, the electronic communications and transactions act that gives government authorities the power to monitor and inspect websites or any activities on information systems for any unlawful activities, and several other laws.

But it’s not just the lawmakers that exploit our personal data. Increasingly companies are collecting as much information as they can about us for commercial purposes, and sometimes we’re completely unaware they’re doing it.

Facebook uploads our address book and stores our contacts, but it asks for permission and tells users why. Google aggregates and combines personal information across its services and stores our information indefinitely, but it forces developers to notify people what data they plan to access.

When we choose “Find Friends,” Twitter stores our address books for up to 18 months without explicit permission for access. Instagram also uploads our contacts’ names, phone numbers or email addresses, and only recently introduced a permissions screen that requires the user to click “allow” to continue.

Compared with other crime categories, mobile banking fraud is an emerging threat and not yet that prevalent in SA. The South African Banking Risk Information Centre claims that they have not had reports about attacks on the actual mobile banking platform, but are aware that cellphones are definitely used by criminals to perpetrate crime.

FNB was the first South African bank to introduce a banking app and it insists it’s secure. The only compromises are where clients divulge their username and password to a third party. FNB warns its clients that they must be vigilant at all times. They also make it clear they never ask them for their username and password combination, whether by email or via SMS.

Although users may not be in a position to stop information being taken from them, they can control what they store on their mobile devices and the security settings they use. Microsoft has a very comprehensive set of guidelines which will help you to identify possible phishing emails, messages, and phone calls. 🙂

Phishing Scams
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Reddit WhatsApp
Previous ArticleForex Calculator – An Important Tool At XFR Financial Ltd
Next Article How to Shop for the Best Magnetic iPhone Cases
Harrison
  • Website

Harrison is a Professional Blogger and Computer Geeks. Apart from Blogging, he is a fun loving person. His areas of Interest are Computers, Web Designing, Photography and WordPress.

Related Posts

Technological Use Cases In the Courier Market

September 28, 2023

5 Cost-effective eCommerce Sites Of Uae – Being Economical Is The Key To Financial Freedom

September 27, 2023

6 Keys to Recording Flawless Webcam Videos

September 25, 2023

Utopia P2P Ecosystem: Is It Important Tool To Stay Safe?

September 18, 2023

The Ongoing Improvements of Test Tech

September 16, 2023

What To Do Immediately if Your Laptop Gets Stolen

September 15, 2023
View 2 Comments

2 Comments

  1. Deepanker Verma on May 27, 2016 7:31 am

    Tricking a person is easier on mobile devices. This is the reason why scammers are now targeting mobile users.

    Reply
  2. appsmarche on May 30, 2016 10:36 am

    Great Article, very helpful data that you have shared, Thank you .

    Reply

Leave A Reply Cancel Reply

Categories
  • Aadhaar Card
  • Adventure & Outdoor
  • Android
  • App Development
  • Apple
  • Area Codes
  • Automobile
  • Blogging
  • Business
  • Chemistry
  • Computing
  • Cryptocurrency
  • Designing
  • Ecommerce
  • Education
  • Electronics
  • Entertainment
  • Event Planning
  • Fashion and Style
  • Food & Recipes
  • Gadgets
  • Gaming
  • Health
  • Hobbies And Crafts
  • Holidays
  • Home & Kitchen
  • Home Decor
  • Home Improvement
  • How to
  • Industry
  • Infographic
  • Insurance
  • Internet
  • Internet Marketing
  • iOS
  • iPhone
  • Jobs & Careers
  • Law
  • Legal
  • Lifestyle
  • Make Money
  • Mobile Apps
  • Mobiles
  • Outsourcing
  • Parenting
  • People & Relationships
  • Personal Finance
  • Pets and Animals
  • Photography
  • Politics
  • Programming
  • Quotes
  • Real Estate
  • Science & Environment
  • Security
  • SEO
  • Shopping
  • Social Networking
  • Softwares
  • Sports
  • Technology
  • Tips and Tricks
  • Top 10
  • Trading & Investing
  • Travel
  • TV Series
  • Uncategorized
  • Web Design
  • Web Development
  • Web Hosting
  • WordPress
  • WordPress Themes
  • Writing & Translation
DMCA.com Protection Status
Popular Articles

Want To Make Your Workplace More Comfortable? Invest In These Gadgets

April 17, 2023

WhatsApp Brings Voice Calling Features For Android Smartphones

December 10, 2022

Key Design Considerations for 3D Printing

September 11, 2023

PCNOK – The Best Patient Care Network of Oklahoma

January 2, 2023
Recent Comments
  • Gary Rice on Where is the 844 area code Location?
  • Amarbir on SEO Benefits of Online Reviews and How to Achieve Them
  • Amarbir on Why Should Your Business Take the Chatbots Advantage
  • Chris Giordano on The Top Things To Consider When Hiring An IT Consulting Company
Recent Posts
  • Designing a Website for Your Startup? Try Using WordPress
  • Cryptocurrency – The Technical Analysis for Beginners
  • Technological Use Cases In the Courier Market
  • Top Tips to Train Staff Better
  • 5 Cost-effective eCommerce Sites Of Uae – Being Economical Is The Key To Financial Freedom
Random Articles

Cryptocurrency – The Technical Analysis for Beginners

September 28, 2023

Technological Use Cases In the Courier Market

September 28, 2023

Top Tips to Train Staff Better

September 27, 2023

It Is Not A Bad Dream: How To Deal With Nightmare Clients Versus Great Clients

September 24, 2023
Copyright © 2013-2023. Tech Feast - All Rights Reserved. | Sitemap.
  • About Us
  • Contact Us
  • Advertise With Us
  • Privacy Policy
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.