Top 10 Phone Scams of 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Phone Scams of 2014-11 Next


Bank scams account for 4.6 percent of all phone scams.

Scammers will pretend to be calling from the victim’s bank, saying their account has been locked or a hold has been placed on their debit card. Victims are asked to "verify" personal account information. This is another vishing scheme designed to get bank account numbers, card numbers, PIN numbers, and more. The Better Business Bureau advises consumers to call their bank directly if they get a call like this.

Despite data breaches like the Sony hack dominating headlines, phone fraud is still a common way that criminals are lifting personal data from consumers. Each year, thousands of consumers and businesses lose money to scams conducted over the telephone. These scams can cost victims anything from a few dollars to their life savings. Attackers use a variety of social engineering and manipulation techniques to extort money and personal information from consumers over the phone.

Pindrop Security collected and analyzed consumer phone scam complaints during the first nine months of 2014 to understand the types of scams being conducted, their frequency and timing, and the methods and motives of phone fraudsters. This information provides a unique view into the risk facing consumers.

Pindrop Security expects that the trend of online and retail data breaches will only increase the amount of information available for phone scammers to use against victims, and that the number of phone scam complaints will continue to rise.

This slideshow features the top 10 phone scams of 2014, as identified by Pindrop Security. 


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.