A Plausible Domestic Hack To Beware Of

Local crime often used break-in or front door fake service and subsequent theft as methods to steal from your home – this still goes on but new hacking methods are now also used which can be far more effective for the criminals.

Here is a Hacking Example

The phone rings at home, you answer and the voice at the other end says that it is a particular service provider. They might say this is your water supplies, electricity or telecoms et al. The person phoning is from an overseas phone service centre and they tell you that there is a serious problem with your account as it has been hacked which is why they are phoning you to re-establish security and save you from theft or fraud. 

They give you the website address to log into the supplier’s website which sounds right and so you log on. They then take you through the process of checking your account and show you that it has been hacked and money stolen. They say they will secure this and return the money.

You are still not completely sure and ask for a name and that you will phone them back.

You then put the phone down and look through the web site and get a customer service phone number to call. The apparent service supplier answers your call and then you are put through to the named person you were speaking with earlier.

You feel secure as you have checked their website which looks fine and you begin to answer the questions about your account and then details about your bank account payments. They then ask more financial details and information about your bank account, passwords and details.

Now You have been Hacked.

This process is not unusual and has been going on for some time as many suppliers know but unfortunately most of us don’t realise the sophistication of these hackers.

Their phone calls sound and seem very professional, they are very customer engaged and civil and they get you to go to what seems like an official and legitimate website and then even after you have been uncertain and called back you are submerged into the hacking process.

Positive Outcome

If this has happened to you take charge of the call and phone back the service supplier but do not use the information that they send via your phone or web. Shut down the call and your computer and then restart and go to the supplier’s web site and get a phone number and start the process again and see if it was real or an attempted hack.

If this has happened to you contact your local police, ActionFraud and Crime Stoppers and if you would like more information. 

You Might Also Read:

Crime Has Become Cybercrime:

Police Can’t Reduce Cybecrime:

« Healthcare Organisations In The Cloud
Winter Olympics Targeted »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Malwarebytes

Malwarebytes

Malwarebytes provides artificial intelligence-powered technology that stops cyberattacks before they can compromise computers and endpoints.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

Bryan Cave LLP

Bryan Cave LLP

Bryan Cave LLP is a global business and litigation law firm. Practice areas include Data Privacy and Security.

Security Innovation

Security Innovation

Security Innovation is a leader in software security assessments and application security training to top organizations worldwide.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

Untangle

Untangle

Untangle provides network security products designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations.

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

Africa ICS Cyber Security Conference

Africa ICS Cyber Security Conference

Africa's largest ICS Cyber Security Conference and Expo. The only platform that will proudly present top level B2B and B2C networking opportunities.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

Digital Craftsmen Ltd

Digital Craftsmen Ltd

We're ISO27001 & Cyber Essentials Cybersecurity experts, delivering full cloud security and managed services. We take a bespoke approach for each client from hosting, optimising & securing them online

The Cyber Guild

The Cyber Guild

The Cyber Guild is a not-for-profit organization working to improve the understanding and practice of cybersecurity, and to help raise awareness and education for all.

Accenture

Accenture

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.

Aurascape AI

Aurascape AI

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture.

Universal Technical Resource Services (UTRS)

Universal Technical Resource Services (UTRS)

UTRS is a technology firm that delivers a wide range of engineering, technical, strategic, and digital services to the public and private sectors.