Top 10 Phone Scams of 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Phone Scams of 2014-3 Next

Home Security Systems

Home security systems scams account for 13.6 percent of all phone scams.

The home security systems scam is the most popular robocall phone scam that Pindrop tracks. Robocallers are automated calling systems – no human is on the line. Victims hear a recorded message offering a free home security system. Fraudsters often use scare tactics in the sales recording, mentioning a rash of burglaries or FBI crime warnings. The free security system is often attached to a pricey long-term system-monitoring contract and includes administrative fees. The Better Business Bureau periodically issues warnings about this scam.

Despite data breaches like the Sony hack dominating headlines, phone fraud is still a common way that criminals are lifting personal data from consumers. Each year, thousands of consumers and businesses lose money to scams conducted over the telephone. These scams can cost victims anything from a few dollars to their life savings. Attackers use a variety of social engineering and manipulation techniques to extort money and personal information from consumers over the phone.

Pindrop Security collected and analyzed consumer phone scam complaints during the first nine months of 2014 to understand the types of scams being conducted, their frequency and timing, and the methods and motives of phone fraudsters. This information provides a unique view into the risk facing consumers.

Pindrop Security expects that the trend of online and retail data breaches will only increase the amount of information available for phone scammers to use against victims, and that the number of phone scam complaints will continue to rise.

This slideshow features the top 10 phone scams of 2014, as identified by Pindrop Security. 

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.