Vishing - The Voice Scam You Need To Know About

Cybercriminals are always finding new ways to trick people, and one of the latest scams on the rise is called vishing, short for voice phishing. Unlike email scams (known as phishing), vishing happens over the phone. Recent studies have highlighted a dramatic escalation in vishing attacks.

The 2025 CrowdStrike Global Threat Report documented a 442% surge in vishing incidents from the first to the second half of 2024. Additionally, research from Enea indicates that vishing, smishing, and phishing attacks have increased by 1,265% since the launch of ChatGPT.

John Mc Loughlin, cybersecurity expert and CEO of J2 Software, says this type of scam is becoming more common - and more convincing. “Here's how it usually works: a scammer calls you, pretending to be from your bank or another trusted company.”

“They’ll say your account has been hacked and then ask you to ‘verify’ your identity by giving them private information like your PIN or password. Because the call feels urgent and sounds real, people often fall for it,” he warns.

Vishing vs. Phishing

The Oxford Dictionary defines vishing as a scam where someone pretends to be from a trusted company and tricks one into giving out personal details, like bank or credit card information.

“While both vishing and phishing aim to steal your private info, the big difference is how they do it. Phishing usually comes through fake emails or websites. Vishing uses voice calls or voicemails to create a sense of urgency and pressure you into acting quickly. This voice approach can feel more personal - and more convincing,” he explains.

Scammers are also getting smarter. They now use spoofing technology to make it look like they're calling from a real company, which makes these calls even harder to spot. That’s why it’s more important than ever for both people and businesses to update their security measures and focus on education and awareness.

How to protect yourself from Vishing

Here are a few simple tips to help stay safe:

  • Don’t give out personal info over the phone, especially if the call was unexpected.
  • Hang up if something feels off. Trust your gut.
  •  Double-check who’s calling. Instead of trusting the caller ID, call the company back using their official number.
  • Use spam call blockers. Many phones and apps can help block scam calls before they reach you.

Stay Alert, Stay Safe

Fighting cybercrime isn’t just about having the right tech - it’s also about being aware and cautious. Whether you're at home or work, being informed about scams like vishing helps keep your personal and company data safe.

“The bottom line? Stay alert, ask questions, and don’t let a phone call rush you into sharing sensitive information. That’s how we can all stay one step ahead of the scammers,” McLoughlin concludes.
 
Image: Ideogram

You Might Also Read: 

What Is The Difference Between Phishing, Smishing & Vishing?:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« DDoS Trends & Predictions For 2025
Rethinking Cyber Defence For Tomorrow's Threats »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

Ground Labs

Ground Labs

Ground Labs is a security software company dedicated to making sensitive data discovery products that help organisations prevent sensitive data loss.

CONCERT

CONCERT

CONCERT is a Computer Emergency Response Team and cyber security information sharing network for companies, institutes and government in Korea.

Verint Systems

Verint Systems

Verint is a leader in CX automation. The world’s most iconic brands rely on our open platform and team of AI-powered bots to create tangible AI business outcomes, now.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

Cologix

Cologix

Cologix provides reliable, secure, scalable data center and interconnection solutions from 24 prime interconnection locations across 9 strategic North American edge markets.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

Cynexlink

Cynexlink

Cynexlink offers Managed IT Services with Security, Network, Storage & Cloud solutions for all size of business.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

MTI

MTI

MTI is a solutions and service provider, specialising in data & cyber security, datacentre modernisation, modern workplace, IT managed services and IT transformation services.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

ImagineX Consulting

ImagineX Consulting

ImagineX Consulting is a cybersecurity-focused boutique technology consultancy whose mission is to help our clients #BeBetter by reducing their corporate risk.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

LT Harper

LT Harper

LT Harper specialise in cyber security recruitment. We believe in providing an individualised service to our customers whether they are looking for a new opportunity or to hire talent.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.

AUCyber

AUCyber

AUCyber is a leading provider of managed cyber security solutions and consultancy services, specialising in supporting Australian organisations and Government agencies.