• Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    • Advertise With Us
  • Business
  • Education
  • Technology
  • Gaming
  • Computing
  • Lifestyle
  • Health
  • Internet
Facebook Twitter Instagram
Tech Feast
  • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    • Advertise With Us
  • Business
  • Education
  • Technology
  • Gaming
  • Computing
  • Lifestyle
  • Health
  • Internet
Facebook Twitter Instagram
Tech Feast
Home»Technology»Online Phishing Scams Escalating to Mobile Technology

Online Phishing Scams Escalating to Mobile Technology

HarrisonBy HarrisonApril 17, 2024 Technology
Facebook Twitter Pinterest Tumblr Email Reddit WhatsApp
Share
Facebook Twitter LinkedIn Pinterest Email Tumblr Reddit WhatsApp

Phishing scams continue to increase the world over, and South Africans are falling prey to them at an alarming rate. Recently South Africa same day cash provider Wonga acted in quick response to complaints from a small percentage of customers, by implementing a live hotline where consumers can report suspicious emails and potential online fraud.

Online Phishing Scams Escalating to Mobile Technology

Online phishing scams
Online phishing scams

With the advent of the Smartphone, more of us are accessing the internet from devices we carry around with us in our pockets. Mobile devices provide convenience in today’s fast-paced life, and as Smartphones become more powerful we’ll undoubtedly use them for more and more tasks. However, we sometimes forget they can store vast amounts of personal information and we need to be vigilant to protect ourselves.

According to Vodacom, cell-phones are generally secure as long as simple safety measures are observed. The most obvious precautions are to physically keep the device near to you and to enable PIN-code protection. When using your Smartphone, exercise the same kind of caution as you would with your PC and steer clear of dodgy internet links, especially those that come via SMS.

Tracking devices and information stored on our mobile devices mean that others can get to know a lot about us, our location and what we’re doing. Governments, for example, use our personal information regularly. In South Africa, the government’s right to access to a customer’s basic information is governed by several statutes.

There’s Rica, the electronic communications and transactions act that gives government authorities the power to monitor and inspect websites or any activities on information systems for any unlawful activities, and several other laws.

But it’s not just the lawmakers that exploit our personal data. Increasingly companies are collecting as much information as they can about us for commercial purposes, and sometimes we’re completely unaware they’re doing it.

Facebook uploads our address book and stores our contacts, but it asks for permission and tells users why. Google aggregates and combines personal information across its services and stores our information indefinitely, but it forces developers to notify people what data they plan to access.

When we choose “Find Friends,” Twitter stores our address books for up to 18 months without explicit permission for access. Instagram also uploads our contacts’ names, phone numbers or email addresses, and only recently introduced a permissions screen that requires the user to click “allow” to continue.

Compared with other crime categories, mobile banking fraud is an emerging threat and not yet that prevalent in SA. The South African Banking Risk Information Centre claims that they have not had reports about attacks on the actual mobile banking platform, but are aware that cellphones are definitely used by criminals to perpetrate crime.

FNB was the first South African bank to introduce a banking app and it insists it’s secure. The only compromises are where clients divulge their username and password to a third party. FNB warns its clients that they must be vigilant at all times. They also make it clear they never ask them for their username and password combination, whether by email or via SMS.

Although users may not be in a position to stop information being taken from them, they can control what they store on their mobile devices and the security settings they use. Microsoft has a very comprehensive set of guidelines which will help you to identify possible phishing emails, messages, and phone calls. 🙂

Phishing Scams
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Reddit WhatsApp
Previous ArticleForex Calculator – An Important Tool At XFR Financial Ltd
Next Article PC, Mobile, Game Console and Even Smart TV – Online Gaming Is Everywhere
Harrison
  • Website

Harrison is a Professional Blogger and Computer Geeks. Apart from Blogging, he is a fun loving person. His areas of Interest are Computers, Web Designing, Photography and WordPress.

Related Posts

Mobile Cases: Extremely Stylish and Useful

June 16, 2025

Securing Your Broadband Connection: Best Practices for Keeping Your Network Safe

June 9, 2025

Free Backup Windows 10 to External Hard Drive with AOMEI Backupper Standard

May 27, 2025

The Evolution of CMMS Software

May 21, 2025

MU Stage 1 and Stage 2 Certification for Professionals

May 21, 2025

The Reasons Why Mobile Telemetry Is A Better Way of Monitoring Patients

May 20, 2025
View 2 Comments

2 Comments

  1. Deepanker Verma on May 27, 2016 7:31 am

    Tricking a person is easier on mobile devices. This is the reason why scammers are now targeting mobile users.

    Reply
  2. appsmarche on May 30, 2016 10:36 am

    Great Article, very helpful data that you have shared, Thank you .

    Reply

Leave A Reply Cancel Reply

Categories
  • Aadhaar Card
  • Adventure & Outdoor
  • Android
  • App Development
  • Apple
  • Area Codes
  • Automobile
  • Blogging
  • Business
  • Chemistry
  • Computing
  • Cryptocurrency
  • Designing
  • Ecommerce
  • Education
  • Electronics
  • Entertainment
  • Event Planning
  • Fashion and Style
  • Food & Recipes
  • Gadgets
  • Gaming
  • Health
  • Hobbies And Crafts
  • Holidays
  • Home & Kitchen
  • Home Decor
  • Home Improvement
  • How to
  • Industry
  • Infographic
  • Insurance
  • Internet
  • Internet Marketing
  • iOS
  • iPhone
  • Jobs & Careers
  • Law
  • Legal
  • Lifestyle
  • Make Money
  • Mobile Apps
  • Mobiles
  • Outsourcing
  • Parenting
  • People & Relationships
  • Personal Finance
  • Pets and Animals
  • Photography
  • Politics
  • Programming
  • Quotes
  • Real Estate
  • Science & Environment
  • Security
  • SEO
  • Shopping
  • Social Networking
  • Softwares
  • Sports
  • Technology
  • Tips and Tricks
  • Top 10
  • Trading & Investing
  • Travel
  • TV Series
  • Uncategorized
  • Web Design
  • Web Development
  • Web Hosting
  • WordPress
  • WordPress Themes
  • Writing & Translation
DMCA.com Protection Status
Popular Articles

How to Handle A Project Management Crisis

May 18, 2025

The Key Ingredient to Building Amazing Buyer Personas Is Audience Analysis

January 22, 2025

Why Startups Should Look to Cloud Software for Payroll

August 2, 2024

What To Know About Different Types of Essays

August 30, 2024
Recent Comments
  • thomas on Why Should Businesses In 2022 Adopt Cloud Storage Solutions?
  • Novels In Tamil on 5 Cyber Threats To Look At In 2021
  • Stephen Curry on Tips to Keep Your Data Safe In Seagate Hard Drive
  • Gary Rice on Where is the 844 area code Location?
Recent Posts
  • Cybersecurity Certifications for Managers
  • Guide to Find Affordable Expired Domains
  • Is Hiring A Virtual Assistant A Good Idea For Your Business?
  • How to Strengthen Cyber Security Cordon for Utility Sector
  • How To Increase Interest In Your Business From The Start
Random Articles

Is Hiring A Virtual Assistant A Good Idea For Your Business?

June 20, 2025

How To Increase Interest In Your Business From The Start

June 19, 2025

Top 10 Reasons to Trade with MT4

June 15, 2025

Exploring the Rapid Rise In Popularity of NFTs

June 10, 2025
Copyright © 2013-2024. Tech Feast - All Rights Reserved. | Sitemap.
  • About Us
  • Contact Us
  • Advertise With Us
  • Privacy Policy
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.