• Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    • Advertise With Us
  • Business
  • Education
  • Technology
  • Gaming
  • Computing
  • Lifestyle
  • Health
  • Internet
Facebook Twitter Instagram
Tech Feast
  • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    • Advertise With Us
  • Business
  • Education
  • Technology
  • Gaming
  • Computing
  • Lifestyle
  • Health
  • Internet
Facebook Twitter Instagram
Tech Feast
Home»Technology»Online Phishing Scams Escalating to Mobile Technology

Online Phishing Scams Escalating to Mobile Technology

HarrisonBy HarrisonJune 29, 2025 Technology
Facebook Twitter Pinterest Tumblr Email Reddit WhatsApp
Share
Facebook Twitter LinkedIn Pinterest Email Tumblr Reddit WhatsApp

Phishing scams continue to increase the world over, and South Africans are falling prey to them at an alarming rate. Recently South Africa same day cash provider Wonga acted in quick response to complaints from a small percentage of customers, by implementing a live hotline where consumers can report suspicious emails and potential online fraud.

Online Phishing Scams Escalating to Mobile Technology

Online phishing scams
Online phishing scams

With the advent of the Smartphone, more of us are accessing the internet from devices we carry around with us in our pockets. Mobile devices provide convenience in today’s fast-paced life, and as Smartphones become more powerful we’ll undoubtedly use them for more and more tasks. However, we sometimes forget they can store vast amounts of personal information and we need to be vigilant to protect ourselves.

According to Vodacom, cell-phones are generally secure as long as simple safety measures are observed. The most obvious precautions are to physically keep the device near to you and to enable PIN-code protection. When using your Smartphone, exercise the same kind of caution as you would with your PC and steer clear of dodgy internet links, especially those that come via SMS.

Tracking devices and information stored on our mobile devices mean that others can get to know a lot about us, our location and what we’re doing. Governments, for example, use our personal information regularly. In South Africa, the government’s right to access to a customer’s basic information is governed by several statutes.

There’s Rica, the electronic communications and transactions act that gives government authorities the power to monitor and inspect websites or any activities on information systems for any unlawful activities, and several other laws.

But it’s not just the lawmakers that exploit our personal data. Increasingly companies are collecting as much information as they can about us for commercial purposes, and sometimes we’re completely unaware they’re doing it.

Facebook uploads our address book and stores our contacts, but it asks for permission and tells users why. Google aggregates and combines personal information across its services and stores our information indefinitely, but it forces developers to notify people what data they plan to access.

When we choose “Find Friends,” Twitter stores our address books for up to 18 months without explicit permission for access. Instagram also uploads our contacts’ names, phone numbers or email addresses, and only recently introduced a permissions screen that requires the user to click “allow” to continue.

Compared with other crime categories, mobile banking fraud is an emerging threat and not yet that prevalent in SA. The South African Banking Risk Information Centre claims that they have not had reports about attacks on the actual mobile banking platform, but are aware that cellphones are definitely used by criminals to perpetrate crime.

FNB was the first South African bank to introduce a banking app and it insists it’s secure. The only compromises are where clients divulge their username and password to a third party. FNB warns its clients that they must be vigilant at all times. They also make it clear they never ask them for their username and password combination, whether by email or via SMS.

Although users may not be in a position to stop information being taken from them, they can control what they store on their mobile devices and the security settings they use. Microsoft has a very comprehensive set of guidelines which will help you to identify possible phishing emails, messages, and phone calls. 🙂

Phishing Scams
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Reddit WhatsApp
Previous ArticleForex Calculator – An Important Tool At XFR Financial Ltd
Next Article How to Shop for the Best Magnetic iPhone Cases
Harrison
  • Website

Harrison is a Professional Blogger and Computer Geeks. Apart from Blogging, he is a fun loving person. His areas of Interest are Computers, Web Designing, Photography and WordPress.

Related Posts

What Advantages Do Emerging Technologies – Provide to the Accounting Sphere?

January 2, 2026

How Can Your E-Commerce Company Use APIs?

December 23, 2025

The Evil Genius of VPNs: The Lies You Don’t Know

December 22, 2025

Why Machine Learning Is Important to Society

December 22, 2025

Michael Rustom Explains How to Navigate Digital Transformation in Traditional Industries

December 16, 2025

Tools Every Software Engineer Should Know About

December 11, 2025
View 2 Comments

2 Comments

  1. Deepanker Verma on May 27, 2016 7:31 am

    Tricking a person is easier on mobile devices. This is the reason why scammers are now targeting mobile users.

    Reply
  2. appsmarche on May 30, 2016 10:36 am

    Great Article, very helpful data that you have shared, Thank you .

    Reply

Leave A Reply Cancel Reply

Categories
  • Aadhaar Card
  • Adventure & Outdoor
  • Android
  • App Development
  • Apple
  • Area Codes
  • Automobile
  • Blogging
  • Business
  • Chemistry
  • Computing
  • Cryptocurrency
  • Designing
  • Ecommerce
  • Education
  • Electronics
  • Entertainment
  • Event Planning
  • Fashion and Style
  • Food & Recipes
  • Gadgets
  • Health
  • Hobbies And Crafts
  • Holidays
  • Home & Kitchen
  • Home Decor
  • Home Improvement
  • How to
  • Industry
  • Infographic
  • Insurance
  • Internet
  • Internet Marketing
  • iOS
  • iPhone
  • Jobs & Careers
  • Law
  • Legal
  • Lifestyle
  • Make Money
  • Mobile Apps
  • Mobiles
  • Outsourcing
  • Parenting
  • People & Relationships
  • Personal Finance
  • Pets and Animals
  • Photography
  • Politics
  • Programming
  • Quotes
  • Real Estate
  • Science & Environment
  • Security
  • SEO
  • Shopping
  • Social Networking
  • Softwares
  • Sports
  • Technology
  • Tips and Tricks
  • Top 10
  • Trading & Investing
  • Travel
  • TV Series
  • Uncategorized
  • Web Design
  • Web Development
  • Web Hosting
  • WordPress
  • WordPress Themes
  • Writing & Translation
DMCA.com Protection Status
Popular Articles

How to Maintain Your WordPress Site’s Best Performance? With Regular Tasks.

January 6, 2025

3 Powerful Tactics to Bolster Your Startup

February 16, 2025

How to Login GoDaddy Email?

April 30, 2025

How to Transfer Text Messages from Android Phone to PC

May 28, 2025
Recent Comments
  • thomas on Why Should Businesses In 2022 Adopt Cloud Storage Solutions?
  • Novels In Tamil on 5 Cyber Threats To Look At In 2021
  • Stephen Curry on Tips to Keep Your Data Safe In Seagate Hard Drive
  • Gary Rice on Where is the 844 area code Location?
Recent Posts
  • What Advantages Do Emerging Technologies – Provide to the Accounting Sphere?
  • The Cure for Project Failure
  • Things to Know About Adhar Card – The World’s Biggest Biometric Database
  • Make Your Business Easier to Run with 24/7 Managed Service
  • 6 Marble Accessories for Your Tech
Random Articles

What Advantages Do Emerging Technologies – Provide to the Accounting Sphere?

January 2, 2026

Make Your Business Easier to Run with 24/7 Managed Service

December 31, 2025

Improve Your Homepage Content and Grow Your Business

December 30, 2025

What Are the Biggest Trends In Business Operations?

December 29, 2025
Copyright © 2013-2024. Tech Feast - All Rights Reserved. | Sitemap.
  • About Us
  • Contact Us
  • Advertise With Us
  • Privacy Policy
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.