A Plausible Domestic Hack To Beware Of

Local crime often used break-in or front door fake service and subsequent theft as methods to steal from your home – this still goes on but new hacking methods are now also used which can be far more effective for the criminals.

Here is a Hacking Example

The phone rings at home, you answer and the voice at the other end says that it is a particular service provider. They might say this is your water supplies, electricity or telecoms et al. The person phoning is from an overseas phone service centre and they tell you that there is a serious problem with your account as it has been hacked which is why they are phoning you to re-establish security and save you from theft or fraud. 

They give you the website address to log into the supplier’s website which sounds right and so you log on. They then take you through the process of checking your account and show you that it has been hacked and money stolen. They say they will secure this and return the money.

You are still not completely sure and ask for a name and that you will phone them back.

You then put the phone down and look through the web site and get a customer service phone number to call. The apparent service supplier answers your call and then you are put through to the named person you were speaking with earlier.

You feel secure as you have checked their website which looks fine and you begin to answer the questions about your account and then details about your bank account payments. They then ask more financial details and information about your bank account, passwords and details.

Now You have been Hacked.

This process is not unusual and has been going on for some time as many suppliers know but unfortunately most of us don’t realise the sophistication of these hackers.

Their phone calls sound and seem very professional, they are very customer engaged and civil and they get you to go to what seems like an official and legitimate website and then even after you have been uncertain and called back you are submerged into the hacking process.

Positive Outcome

If this has happened to you take charge of the call and phone back the service supplier but do not use the information that they send via your phone or web. Shut down the call and your computer and then restart and go to the supplier’s web site and get a phone number and start the process again and see if it was real or an attempted hack.

If this has happened to you contact your local police, ActionFraud and Crime Stoppers and if you would like more information. 

You Might Also Read:

Crime Has Become Cybercrime:

Police Can’t Reduce Cybecrime:

« Healthcare Organisations In The Cloud
Winter Olympics Targeted »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

Authorize.Net

Authorize.Net

Authorize.Net is a Payment Gateway which provides the complex infrastructure and security necessary to ensure fast, reliable and secure transactions.

SBS CyberSecurity

SBS CyberSecurity

SBS CyberSecurity is a premier cybersecurity consulting and audit firm.

Mission Secure (MSi)

Mission Secure (MSi)

MSi is a specialized provider of next generation cyber defense solutions protecting control systems and critical physical assets in energy, transportation and defense.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

Nordic Cyber Summit

Nordic Cyber Summit

Nordic Cyber Security Summit addresses a wide range of technological issues from the IT Security spectrum and also provides a wider perspective from all aspects of the industry.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

Assured Clarity

Assured Clarity

Assured Clarity are a global consultancy, specialising in Risk Management and Data Privacy, through Education, Awareness and Training, throughout an organisation.

Cyber Risk International

Cyber Risk International

Cyber Risk International offer CyberPrism, a B2B SaaS solution that empowers businesses to perform a self-assessment of their cyber security program.

Kahootz

Kahootz

Kahootz is a highly secure cloud collaboration platform helping teams to work together across organisations.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.