• Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    • Advertise With Us
  • Business
  • Education
  • Technology
  • Gaming
  • Computing
  • Lifestyle
  • Health
  • Internet
Facebook Twitter Instagram
Tech Feast
  • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    • Advertise With Us
  • Business
  • Education
  • Technology
  • Gaming
  • Computing
  • Lifestyle
  • Health
  • Internet
Facebook Twitter Instagram
Tech Feast
Home»Technology»Online Phishing Scams Escalating to Mobile Technology

Online Phishing Scams Escalating to Mobile Technology

HarrisonBy HarrisonJune 29, 2025 Technology
Facebook Twitter Pinterest Tumblr Email Reddit WhatsApp
Share
Facebook Twitter LinkedIn Pinterest Email Tumblr Reddit WhatsApp

Phishing scams continue to increase the world over, and South Africans are falling prey to them at an alarming rate. Recently South Africa same day cash provider Wonga acted in quick response to complaints from a small percentage of customers, by implementing a live hotline where consumers can report suspicious emails and potential online fraud.

Online Phishing Scams Escalating to Mobile Technology

Online phishing scams
Online phishing scams

With the advent of the Smartphone, more of us are accessing the internet from devices we carry around with us in our pockets. Mobile devices provide convenience in today’s fast-paced life, and as Smartphones become more powerful we’ll undoubtedly use them for more and more tasks. However, we sometimes forget they can store vast amounts of personal information and we need to be vigilant to protect ourselves.

According to Vodacom, cell-phones are generally secure as long as simple safety measures are observed. The most obvious precautions are to physically keep the device near to you and to enable PIN-code protection. When using your Smartphone, exercise the same kind of caution as you would with your PC and steer clear of dodgy internet links, especially those that come via SMS.

Tracking devices and information stored on our mobile devices mean that others can get to know a lot about us, our location and what we’re doing. Governments, for example, use our personal information regularly. In South Africa, the government’s right to access to a customer’s basic information is governed by several statutes.

There’s Rica, the electronic communications and transactions act that gives government authorities the power to monitor and inspect websites or any activities on information systems for any unlawful activities, and several other laws.

But it’s not just the lawmakers that exploit our personal data. Increasingly companies are collecting as much information as they can about us for commercial purposes, and sometimes we’re completely unaware they’re doing it.

Facebook uploads our address book and stores our contacts, but it asks for permission and tells users why. Google aggregates and combines personal information across its services and stores our information indefinitely, but it forces developers to notify people what data they plan to access.

When we choose “Find Friends,” Twitter stores our address books for up to 18 months without explicit permission for access. Instagram also uploads our contacts’ names, phone numbers or email addresses, and only recently introduced a permissions screen that requires the user to click “allow” to continue.

Compared with other crime categories, mobile banking fraud is an emerging threat and not yet that prevalent in SA. The South African Banking Risk Information Centre claims that they have not had reports about attacks on the actual mobile banking platform, but are aware that cellphones are definitely used by criminals to perpetrate crime.

FNB was the first South African bank to introduce a banking app and it insists it’s secure. The only compromises are where clients divulge their username and password to a third party. FNB warns its clients that they must be vigilant at all times. They also make it clear they never ask them for their username and password combination, whether by email or via SMS.

Although users may not be in a position to stop information being taken from them, they can control what they store on their mobile devices and the security settings they use. Microsoft has a very comprehensive set of guidelines which will help you to identify possible phishing emails, messages, and phone calls. 🙂

Phishing Scams
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Reddit WhatsApp
Previous ArticleForex Calculator – An Important Tool At XFR Financial Ltd
Next Article PC, Mobile, Game Console and Even Smart TV – Online Gaming Is Everywhere
Harrison
  • Website

Harrison is a Professional Blogger and Computer Geeks. Apart from Blogging, he is a fun loving person. His areas of Interest are Computers, Web Designing, Photography and WordPress.

Related Posts

Managed IT Services Houston Texas Can Provide for You

July 4, 2025

Why You Need IT Outsourcing

July 2, 2025

Mobile Cases: Extremely Stylish and Useful

June 16, 2025

Securing Your Broadband Connection: Best Practices for Keeping Your Network Safe

June 9, 2025

Free Backup Windows 10 to External Hard Drive with AOMEI Backupper Standard

May 27, 2025

The Evolution of CMMS Software

May 21, 2025
View 2 Comments

2 Comments

  1. Deepanker Verma on May 27, 2016 7:31 am

    Tricking a person is easier on mobile devices. This is the reason why scammers are now targeting mobile users.

    Reply
  2. appsmarche on May 30, 2016 10:36 am

    Great Article, very helpful data that you have shared, Thank you .

    Reply

Leave A Reply Cancel Reply

Categories
  • Aadhaar Card
  • Adventure & Outdoor
  • Android
  • App Development
  • Apple
  • Area Codes
  • Automobile
  • Blogging
  • Business
  • Chemistry
  • Computing
  • Cryptocurrency
  • Designing
  • Ecommerce
  • Education
  • Electronics
  • Entertainment
  • Event Planning
  • Fashion and Style
  • Food & Recipes
  • Gadgets
  • Gaming
  • Health
  • Hobbies And Crafts
  • Holidays
  • Home & Kitchen
  • Home Decor
  • Home Improvement
  • How to
  • Industry
  • Infographic
  • Insurance
  • Internet
  • Internet Marketing
  • iOS
  • iPhone
  • Jobs & Careers
  • Law
  • Legal
  • Lifestyle
  • Make Money
  • Mobile Apps
  • Mobiles
  • Outsourcing
  • Parenting
  • People & Relationships
  • Personal Finance
  • Pets and Animals
  • Photography
  • Politics
  • Programming
  • Quotes
  • Real Estate
  • Science & Environment
  • Security
  • SEO
  • Shopping
  • Social Networking
  • Softwares
  • Sports
  • Technology
  • Tips and Tricks
  • Top 10
  • Trading & Investing
  • Travel
  • TV Series
  • Uncategorized
  • Web Design
  • Web Development
  • Web Hosting
  • WordPress
  • WordPress Themes
  • Writing & Translation
DMCA.com Protection Status
Popular Articles

Play Fantasy Cricket Game & Fantasy League Online On Dream 11

March 13, 2025

The Truth About Plagiarism: The Most Popular Google Search Queries

June 4, 2024

Is Your Company Using Project Portfolio Management (PPM) Effectively?

March 8, 2025

Hacks to Make Your Travelling Cheaper

May 25, 2025
Recent Comments
  • thomas on Why Should Businesses In 2022 Adopt Cloud Storage Solutions?
  • Novels In Tamil on 5 Cyber Threats To Look At In 2021
  • Stephen Curry on Tips to Keep Your Data Safe In Seagate Hard Drive
  • Gary Rice on Where is the 844 area code Location?
Recent Posts
  • SEO Rules for Blogging Success
  • Online Jobs For Students to Earn Money
  • Why Is Ethical Marketing Essential to the Digital Business?
  • 6 Key Reasons Why A Virtual Phone Number Is Beneficial to Your Business In 2022
  • How To Pick Your Business and Mover Data Product Solutions
Random Articles

Why Is Ethical Marketing Essential to the Digital Business?

July 16, 2025

6 Key Reasons Why A Virtual Phone Number Is Beneficial to Your Business In 2022

July 15, 2025

How To Pick Your Business and Mover Data Product Solutions

July 15, 2025

How To Make Your Business More Efficient

July 13, 2025
Copyright © 2013-2024. Tech Feast - All Rights Reserved. | Sitemap.
  • About Us
  • Contact Us
  • Advertise With Us
  • Privacy Policy
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.