{"id":67100,"date":"2022-11-15T10:47:31","date_gmt":"2022-11-15T08:47:31","guid":{"rendered":"https:\/\/www.mywot.com\/blog\/?p=67100"},"modified":"2025-01-07T11:01:46","modified_gmt":"2025-01-07T09:01:46","slug":"vishing","status":"publish","type":"post","link":"https:\/\/www.mywot.com\/blog\/vishing","title":{"rendered":"What is Vishing? 7 Things You Can Do to Stop It"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Did you get a call from someone posing as a bank representative, claiming there is suspicious activity on your account? Or maybe you received a tech support call, telling you that your computer has a virus and is requesting remote access to fix the problem? That\u2019s most likely a \u201cvishing\u201d attempt, a type of social engineering attack that\u2019s currently on the rise.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What is vishing?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Vishing, which is short for \u201cvoice phishing\u201d, is a scam where criminals use phone calls to trick people into giving out personal or financial information. These scammers often pretend to be from trusted organizations like banks, tech support, or government agencies. They create a sense of urgency, convincing victims to act quickly to resolve an issue or avoid a penalty.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What happens is that these attackers use tactics like spoofing caller ID to make it seem like they are calling from a legitimate number. They might ask for sensitive information such as social security numbers, passwords, or credit card details. Vishing can occur via live calls or through automated voice messages, known as <\/span><a href=\"https:\/\/consumer.ftc.gov\/articles\/robocalls\"><span style=\"font-weight: 400;\">robocalls<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-67099 size-full\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/11\/Vishing-2.jpg\" alt=\"Hacking to a mobile device\" width=\"800\" height=\"475\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/11\/Vishing-2.jpg 800w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/11\/Vishing-2-300x178.jpg 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/11\/Vishing-2-768x456.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n\n\n<h2 class=\"wp-block-heading\">What is the difference between vishing, smishing, and phishing?<\/h2>\n\n\n\n<p>Phishing, smishing, and vishing are all scams where criminals try to steal personal information. The difference lies in the methods that they use:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Phishing<\/h3>\n\n\n\n<p>This involves sending fake emails that look like they come from trusted sources. These emails often contain links to fake websites designed to steal login credentials, financial information, or other sensitive data.<\/p>\n\n\n\n<p>For example, you might receive an email claiming to be from your bank, asking you to verify your account details. When you click the link, you\u2019re taken to a website that looks legitimate but is actually controlled by scammers.<\/p>\n\n\n\n<p>Read more: <a href=\"https:\/\/www.mywot.com\/blog\/phishing-emails\" target=\"_blank\" rel=\"noreferrer noopener\">What Are Phishing Emails and How Do You Stop Them?<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Smishing<\/h3>\n\n\n\n<p>This is similar to phishing but it uses SMS or text messages instead of emails. The term is a combination of:<\/p>\n\n\n\n<ol>\n<li>SMS or Short Message Service<\/li>\n\n\n\n<li>Phishing<\/li>\n<\/ol>\n\n\n\n<p>Scammers send text messages that appear to be from trusted organizations, urging recipients to click on a link or call a phone number. These messages often create a sense of urgency, such as claiming your account will be locked if you don\u2019t respond immediately. The goal is to get you to disclose personal information or install malicious software on your phone.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Vishing<\/h3>\n\n\n\n<p>This method involves phone calls. The term combines &#8220;voice&#8221; and &#8220;phishing.&#8221; In a vishing attack, the scammer calls you, often pretending to be from a trusted organization such as:<\/p>\n\n\n\n<ul>\n<li>A bank<\/li>\n\n\n\n<li>A tech support<\/li>\n\n\n\n<li>A government agency<\/li>\n<\/ul>\n\n\n\n<p>They might tell you there\u2019s a problem with your account or that you need to verify some information. The caller might use caller ID spoofing to make it appear as though they are calling from a legitimate number. Their goal is to trick you into providing sensitive information or making a payment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to recognize vishing?<\/h2>\n\n\n\n<p>Vishing scams can be tricky to spot because they often seem like legitimate phone calls from trusted sources. Here are some tips to help you recognize vishing attempts:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Unexpected Calls<\/h3>\n\n\n\n<p>Be cautious if you get an unsolicited call asking for personal or financial information. Remember that legitimate organizations rarely request sensitive information over the phone without prior contact.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Urgency and Fear<\/h3>\n\n\n\n<p>Scammers often create a sense of urgency or fear to pressure you into making quick decisions. They might claim there\u2019s a problem with your bank account, or that you owe money to the government. This urgency is a form of tactic to make you act without thinking.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Request for Sensitive Information<\/h3>\n\n\n\n<p>Hold back if the caller asks for personal details like:<\/p>\n\n\n\n<ul>\n<li>Social security numbers<\/li>\n\n\n\n<li>Bank account information<\/li>\n\n\n\n<li>Passwords<\/li>\n<\/ul>\n\n\n\n<p>It\u2019s likely a scam. Legitimate companies never request this information over the phone.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Caller ID Spoofing<\/h3>\n\n\n\n<p>Scammers can make it appear as though they\u2019re calling from a trusted number, such as your bank or a government agency. Even if the number looks familiar, be cautious of any unsolicited calls.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Poor Call Quality and Unprofessional Behavior<\/h3>\n\n\n\n<p>Calls that have poor audio quality or come from representatives who sound unprofessional can be a sign of a scam. Legit businesses typically maintain professional conduct during phone calls.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Unusual Payment Requests<\/h3>\n\n\n\n<p>If the caller asks for payment through unconventional methods, like gift cards or wire transfers, drop the call. Trusted companies will never ask for payments in these forms.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Verify the Caller<\/h3>\n\n\n\n<p>Always take the time to verify the caller\u2019s identity. Hang up and call the organization directly using a phone number from their official website. Do not use any numbers provided by the caller.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Repeated Calls<\/h3>\n\n\n\n<p>Receiving multiple calls from the same number, especially if the caller is aggressive or persistent, is often a sign of a scam. Report these numbers to your phone carrier or a relevant authority.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">11 common vishing scams<\/h2>\n\n\n\n<p>Vishing scams use deceptive phone calls to trick people into giving away personal information. These are the common scams to help you recognize and avoid them:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Bank Fraud Calls<\/h3>\n\n\n\n<p>Scammers pose as bank representatives, claiming suspicious activity on your account. They ask for your account number, PIN, or other sensitive information to &#8220;verify&#8221; your identity. Real banks never ask for this information over the phone.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Tech Support Scams<\/h3>\n\n\n\n<p>These scammers pretend to be from tech support, often claiming there is a virus on your computer. They ask for remote access to fix the problem, which gives them control over your device and access to your personal information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Government Impersonation<\/h3>\n\n\n\n<p>Posing as officials from tax agencies or other government bodies, scammers claim you owe money or face legal action. They use fear and urgency to pressure you into paying fines or revealing sensitive information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Lottery Winnings<\/h3>\n\n\n\n<p>You receive a call informing you that you\u2019ve won a lottery or prize. To claim it, you must provide bank details or pay a fee. Legitimate lotteries don\u2019t ask for money upfront to release winnings.<\/p>\n\n\n\n<p>Read more: <a href=\"https:\/\/www.mywot.com\/blog\/lottery-scams\">Beware of the lottery scams<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Charity Scams<\/h3>\n\n\n\n<p>Scammers exploit your goodwill by pretending to be from charities, often after natural disasters or during holidays. They ask for donations, which go directly into their pockets. Verify charities before donating.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Debt Collection<\/h3>\n\n\n\n<p>Fraudsters claim you have unpaid debts and threaten legal action or arrest if you don\u2019t pay immediately. They often demand payment through unconventional methods like gift cards or wire transfers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Healthcare Scams<\/h3>\n\n\n\n<p>Pretending to be from health insurance companies or medical providers, these scammers offer fake services or claim there\u2019s an issue with your policy. They ask for personal information or payments to &#8220;fix&#8221; the problem.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. Customer Service Impersonation<\/h3>\n\n\n\n<p>Scammers call pretending to be from well-known companies, stating there\u2019s an issue with your account or order. They request your login details or credit card information to &#8220;resolve&#8221; the issue.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">9. Job Offer Scams<\/h3>\n\n\n\n<p>Fraudsters offer fake job opportunities, requiring you to provide personal details or pay upfront for training or materials. Always research job offers and contact the company directly through official channels.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">10. Utility Company Scams<\/h3>\n\n\n\n<p>Claiming to be from your utility provider, scammers state that you have an overdue bill and threaten to cut off services unless you pay immediately. Utility companies usually send multiple notices before taking such action.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">11. Family Emergency Scams<\/h3>\n\n\n\n<p>Scammers pretend to be a relative in trouble or claim a family member is in danger, needing immediate financial help. Verify the situation by contacting other family members before taking any action.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to avoid phishing attacks?<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.mywot.com\/blog\/spot-stop-phishing-attacks\">Phishing attacks<\/a> can result in identity theft and financial loss. Here are some tips and tools to help you stay safe from these kinds of attacks:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Use the WOT Browser Extension and App<\/h3>\n\n\n\n<p>The WOT <a href=\"https:\/\/chromewebstore.google.com\/detail\/wot-website-security-safe\/bhmmomiinigofkjcapegjjndpbikblnp?hl=en\">browser extension<\/a> and <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.wot.security&amp;hl=en\">app<\/a> alerts you about suspicious websites. It uses community ratings and reviews to warn you if a site is known for phishing or other malicious activities.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"1892\" height=\"951\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2024\/06\/Safe-Browsing.png\" alt=\"Safe Browsing\" class=\"wp-image-67526\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2024\/06\/Safe-Browsing.png 1892w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2024\/06\/Safe-Browsing-300x151.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2024\/06\/Safe-Browsing-1024x515.png 1024w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2024\/06\/Safe-Browsing-768x386.png 768w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2024\/06\/Safe-Browsing-1536x772.png 1536w\" sizes=\"(max-width: 1892px) 100vw, 1892px\" \/><\/figure>\n\n\n\n<p>Before clicking any link, check the WOT rating to see if the site is trustworthy. This can be very helpful for spotting fake websites designed to steal your information.<\/p>\n\n\n\n<p>In addition, it also has a Data Privacy feature, which will alert you if your personal data has been leaked so you can immediately take action.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"1889\" height=\"947\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/07\/Data-Breach-Monitoring-feature.png\" alt=\"Data Breach Monitoring feature\" class=\"wp-image-67514\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/07\/Data-Breach-Monitoring-feature.png 1889w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/07\/Data-Breach-Monitoring-feature-300x150.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/07\/Data-Breach-Monitoring-feature-1024x513.png 1024w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/07\/Data-Breach-Monitoring-feature-768x385.png 768w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/07\/Data-Breach-Monitoring-feature-1536x770.png 1536w\" sizes=\"(max-width: 1889px) 100vw, 1889px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">2. Verify Caller Identity<\/h3>\n\n\n\n<p>If you get a call asking for personal information, immediately hang up and call back using a number from the official website of the organization. This way, you can make sure you are talking to a legitimate representative and not a scammer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Avoid Sharing Personal Information<\/h3>\n\n\n\n<p>Be careful about sharing personal information over the phone or online. Scammers often pose as legitimate entities to collect sensitive details.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Stay Informed<\/h3>\n\n\n\n<p>Keep yourself informed about the latest phishing scams by reading news from trusted cybersecurity sites where authors share and warn about new threats. You should read about <a href=\"https:\/\/www.mywot.com\/blog\/top-cybersecurity-faqs\">cybersecurity FAQs<\/a> so you can recognize and avoid phishing attempts more effectively.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Install Call-Blocking Apps<\/h3>\n\n\n\n<p>Call-blocking apps can help filter out unwanted and suspicious calls. These apps use databases of known scam numbers to block them before they reach you.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Report Suspicious Calls<\/h3>\n\n\n\n<p>Reporting suspicious calls to authorities can help track and prevent scams. Many phishing attempts rely on high volume, so reporting can reduce the number of potential victims..<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. Educate Yourself and Others<\/h3>\n\n\n\n<p>Sharing knowledge about phishing tactics and prevention methods can protect not only yourself but also your friends and family. Take advantage of social media to help spread awareness about online safety.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Importance of Being Alert and Informed<\/h2>\n\n\n\n<p>Being alert and informed is your best defense against vishing attacks. Scammers keep changing their methods, so it&#8217;s important to recognize the signs of vishing. Tools like the WOT browser extension and app can enhance your protection by warning you of suspicious websites and phone numbers.<\/p>\n\n\n\n<p>Regularly update your knowledge about common scams and follow best practices to avoid falling victim to these tricks. With these steps, you can protect your personal and financial information from vishing attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">FAQs<\/h2>\n\n\n\n<p><strong>What should I do if I receive a vishing call?<\/strong><strong><br><\/strong>If you get a vishing call, stay calm and don\u2019t give out any personal information. Hang up immediately. If the caller claims to be from a known organization, contact that organization directly using a number from their official website to verify the call. Always report suspicious calls to your local authorities or cybersecurity organizations. This helps track and potentially stop these scammers.<\/p>\n\n\n\n<p><strong>Can vishing attacks occur on mobile phones?<\/strong><strong><br><\/strong>Yes, vishing attacks can happen on both mobile phones and landlines. Scammers use various techniques to mask their numbers, making it look like they\u2019re calling from a trusted source. Mobile phones are particularly vulnerable because many people rely heavily on them for personal and professional communication.<\/p>\n\n\n\n<p><strong>What are some signs of a vishing attack?<\/strong><strong><br><\/strong>Common signs of a vishing attack include unexpected calls asking for personal information, the caller creating a sense of urgency or fear, and requests for sensitive details like social security numbers, passwords, or credit card information. These calls often come from spoofed numbers that mimic legitimate businesses or government agencies. If something feels off or too urgent, it\u2019s likely a scam.<\/p>\n\n\n\n<p><strong>How can businesses protect employees from vishing?<\/strong><strong><br><\/strong>Businesses can protect their employees by conducting regular security awareness training. Educate employees about the risks of vishing and the common tactics used by scammers. Implement strict policies on sharing personal or company information over the phone. Using caller ID verification and call-blocking technologies can also help filter out suspicious calls before they reach employees.<\/p>\n\n\n\n<p><strong>Are vishing attacks on the rise?<\/strong><strong><br><\/strong>Yes, vishing attacks have been increasing significantly. With more people working remotely and relying on phone communication, scammers are exploiting this trend. Reports from <a href=\"https:\/\/www.gsma.com\/get-involved\/gsma-membership\/gsma_resources\/combating-vishing-an-analysis-of-voice-call-impersonation-and-emerging-defenses\/\">GSMA<\/a> show that in 2023, hybrid vishing attack rates have surged by 554%. This is why staying informed and cautious is the best defense against this growing threat.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Did you get a call from someone posing as a bank representative, claiming there is suspicious activity on your account? Or maybe you received a tech support call, telling you that your computer has a virus and is requesting remote access to fix the problem? That\u2019s most likely a \u201cvishing\u201d attempt, a type of social [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":67591,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[1,39],"tags":[1],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Vishing and What You Can Do to Stop It | WOT<\/title>\n<meta name=\"description\" content=\"Learn about vishing, a rising cyber threat. Discover how to recognize and avoid these attacks, and protect yourself using WOT&#039;s tools. Read more now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mywot.com\/blog\/vishing\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Vishing and What You Can Do to Stop It | WOT\" \/>\n<meta property=\"og:description\" content=\"Learn about vishing, a rising cyber threat. Discover how to recognize and avoid these attacks, and protect yourself using WOT&#039;s tools. Read more now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mywot.com\/blog\/vishing\" \/>\n<meta property=\"og:site_name\" content=\"WOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weboftrust\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-15T08:47:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T09:01:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/11\/What-is-Vishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"608\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alex at WOT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:site\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex at WOT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mywot.com\/blog\/vishing#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/vishing\"},\"author\":{\"name\":\"Alex at WOT\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\"},\"headline\":\"What is Vishing? 7 Things You Can Do to Stop It\",\"datePublished\":\"2022-11-15T08:47:31+00:00\",\"dateModified\":\"2025-01-07T09:01:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/vishing\"},\"wordCount\":1976,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"keywords\":[\"General discussion\"],\"articleSection\":[\"General discussion\",\"Safe Browsing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.mywot.com\/blog\/vishing#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mywot.com\/blog\/vishing\",\"url\":\"https:\/\/www.mywot.com\/blog\/vishing\",\"name\":\"What is Vishing and What You Can Do to Stop It | WOT\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\"},\"datePublished\":\"2022-11-15T08:47:31+00:00\",\"dateModified\":\"2025-01-07T09:01:46+00:00\",\"description\":\"Learn about vishing, a rising cyber threat. Discover how to recognize and avoid these attacks, and protect yourself using WOT's tools. Read more now!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/vishing#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mywot.com\/blog\/vishing\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mywot.com\/blog\/vishing#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.mywot.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Vishing? 7 Things You Can Do to Stop It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"name\":\"WOT\",\"description\":\"Safe Web Search &amp; Browsing\",\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"alternateName\":\"WOT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mywot.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\",\"name\":\"Web of Trust\",\"alternateName\":\"WOT\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"contentUrl\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"width\":395,\"height\":150,\"caption\":\"Web of Trust\"},\"image\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/weboftrust\",\"https:\/\/twitter.com\/Web_of_Trust\",\"https:\/\/www.linkedin.com\/company\/wot-services-ltd.\",\"https:\/\/www.youtube.com\/user\/MyWOT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\",\"name\":\"Alex at WOT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"caption\":\"Alex at WOT\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Vishing and What You Can Do to Stop It | WOT","description":"Learn about vishing, a rising cyber threat. Discover how to recognize and avoid these attacks, and protect yourself using WOT's tools. Read more now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mywot.com\/blog\/vishing","og_locale":"en_US","og_type":"article","og_title":"What is Vishing and What You Can Do to Stop It | WOT","og_description":"Learn about vishing, a rising cyber threat. Discover how to recognize and avoid these attacks, and protect yourself using WOT's tools. Read more now!","og_url":"https:\/\/www.mywot.com\/blog\/vishing","og_site_name":"WOT","article_publisher":"https:\/\/www.facebook.com\/weboftrust","article_published_time":"2022-11-15T08:47:31+00:00","article_modified_time":"2025-01-07T09:01:46+00:00","og_image":[{"width":1024,"height":608,"url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/11\/What-is-Vishing.jpg","type":"image\/jpeg"}],"author":"Alex at WOT","twitter_card":"summary_large_image","twitter_creator":"@Web_of_Trust","twitter_site":"@Web_of_Trust","twitter_misc":{"Written by":"Alex at WOT","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mywot.com\/blog\/vishing#article","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/vishing"},"author":{"name":"Alex at WOT","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9"},"headline":"What is Vishing? 7 Things You Can Do to Stop It","datePublished":"2022-11-15T08:47:31+00:00","dateModified":"2025-01-07T09:01:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mywot.com\/blog\/vishing"},"wordCount":1976,"commentCount":0,"publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"keywords":["General discussion"],"articleSection":["General discussion","Safe Browsing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mywot.com\/blog\/vishing#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mywot.com\/blog\/vishing","url":"https:\/\/www.mywot.com\/blog\/vishing","name":"What is Vishing and What You Can Do to Stop It | WOT","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/#website"},"datePublished":"2022-11-15T08:47:31+00:00","dateModified":"2025-01-07T09:01:46+00:00","description":"Learn about vishing, a rising cyber threat. Discover how to recognize and avoid these attacks, and protect yourself using WOT's tools. Read more now!","breadcrumb":{"@id":"https:\/\/www.mywot.com\/blog\/vishing#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mywot.com\/blog\/vishing"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mywot.com\/blog\/vishing#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mywot.com\/blog"},{"@type":"ListItem","position":2,"name":"What is Vishing? 7 Things You Can Do to Stop It"}]},{"@type":"WebSite","@id":"https:\/\/www.mywot.com\/blog\/#website","url":"https:\/\/www.mywot.com\/blog\/","name":"WOT","description":"Safe Web Search &amp; Browsing","publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"alternateName":"WOT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mywot.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mywot.com\/blog\/#organization","name":"Web of Trust","alternateName":"WOT","url":"https:\/\/www.mywot.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","contentUrl":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","width":395,"height":150,"caption":"Web of Trust"},"image":{"@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weboftrust","https:\/\/twitter.com\/Web_of_Trust","https:\/\/www.linkedin.com\/company\/wot-services-ltd.","https:\/\/www.youtube.com\/user\/MyWOT"]},{"@type":"Person","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9","name":"Alex at WOT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","caption":"Alex at WOT"}}]}},"_links":{"self":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/67100"}],"collection":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/comments?post=67100"}],"version-history":[{"count":6,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/67100\/revisions"}],"predecessor-version":[{"id":68090,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/67100\/revisions\/68090"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media\/67591"}],"wp:attachment":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media?parent=67100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/categories?post=67100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/tags?post=67100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}