• Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    • Advertise With Us
  • Business
  • Education
  • Technology
  • Gaming
  • Computing
  • Lifestyle
  • Health
  • Internet
Facebook Twitter Instagram
Tech Feast
  • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Disclaimer
    • Advertise With Us
  • Business
  • Education
  • Technology
  • Gaming
  • Computing
  • Lifestyle
  • Health
  • Internet
Facebook Twitter Instagram
Tech Feast
Home»Technology»Online Phishing Scams Escalating to Mobile Technology

Online Phishing Scams Escalating to Mobile Technology

HarrisonBy HarrisonApril 17, 2024 Technology
Facebook Twitter Pinterest Tumblr Email Reddit WhatsApp
Share
Facebook Twitter LinkedIn Pinterest Email Tumblr Reddit WhatsApp

Phishing scams continue to increase the world over, and South Africans are falling prey to them at an alarming rate. Recently South Africa same day cash provider Wonga acted in quick response to complaints from a small percentage of customers, by implementing a live hotline where consumers can report suspicious emails and potential online fraud.

Online Phishing Scams Escalating to Mobile Technology

Online phishing scams
Online phishing scams

With the advent of the Smartphone, more of us are accessing the internet from devices we carry around with us in our pockets. Mobile devices provide convenience in today’s fast-paced life, and as Smartphones become more powerful we’ll undoubtedly use them for more and more tasks. However, we sometimes forget they can store vast amounts of personal information and we need to be vigilant to protect ourselves.

According to Vodacom, cell-phones are generally secure as long as simple safety measures are observed. The most obvious precautions are to physically keep the device near to you and to enable PIN-code protection. When using your Smartphone, exercise the same kind of caution as you would with your PC and steer clear of dodgy internet links, especially those that come via SMS.

Tracking devices and information stored on our mobile devices mean that others can get to know a lot about us, our location and what we’re doing. Governments, for example, use our personal information regularly. In South Africa, the government’s right to access to a customer’s basic information is governed by several statutes.

There’s Rica, the electronic communications and transactions act that gives government authorities the power to monitor and inspect websites or any activities on information systems for any unlawful activities, and several other laws.

But it’s not just the lawmakers that exploit our personal data. Increasingly companies are collecting as much information as they can about us for commercial purposes, and sometimes we’re completely unaware they’re doing it.

Facebook uploads our address book and stores our contacts, but it asks for permission and tells users why. Google aggregates and combines personal information across its services and stores our information indefinitely, but it forces developers to notify people what data they plan to access.

When we choose “Find Friends,” Twitter stores our address books for up to 18 months without explicit permission for access. Instagram also uploads our contacts’ names, phone numbers or email addresses, and only recently introduced a permissions screen that requires the user to click “allow” to continue.

Compared with other crime categories, mobile banking fraud is an emerging threat and not yet that prevalent in SA. The South African Banking Risk Information Centre claims that they have not had reports about attacks on the actual mobile banking platform, but are aware that cellphones are definitely used by criminals to perpetrate crime.

FNB was the first South African bank to introduce a banking app and it insists it’s secure. The only compromises are where clients divulge their username and password to a third party. FNB warns its clients that they must be vigilant at all times. They also make it clear they never ask them for their username and password combination, whether by email or via SMS.

Although users may not be in a position to stop information being taken from them, they can control what they store on their mobile devices and the security settings they use. Microsoft has a very comprehensive set of guidelines which will help you to identify possible phishing emails, messages, and phone calls. 🙂

Phishing Scams
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Reddit WhatsApp
Previous ArticleForex Calculator – An Important Tool At XFR Financial Ltd
Next Article PC, Mobile, Game Console and Even Smart TV – Online Gaming Is Everywhere
Harrison
  • Website

Harrison is a Professional Blogger and Computer Geeks. Apart from Blogging, he is a fun loving person. His areas of Interest are Computers, Web Designing, Photography and WordPress.

Related Posts

Securing Your Broadband Connection: Best Practices for Keeping Your Network Safe

June 9, 2025

Free Backup Windows 10 to External Hard Drive with AOMEI Backupper Standard

May 27, 2025

The Evolution of CMMS Software

May 21, 2025

MU Stage 1 and Stage 2 Certification for Professionals

May 21, 2025

The Reasons Why Mobile Telemetry Is A Better Way of Monitoring Patients

May 20, 2025

Energy Saving Technology to Reduce Utility Bills

May 17, 2025
View 2 Comments

2 Comments

  1. Deepanker Verma on May 27, 2016 7:31 am

    Tricking a person is easier on mobile devices. This is the reason why scammers are now targeting mobile users.

    Reply
  2. appsmarche on May 30, 2016 10:36 am

    Great Article, very helpful data that you have shared, Thank you .

    Reply

Leave A Reply Cancel Reply

Categories
  • Aadhaar Card
  • Adventure & Outdoor
  • Android
  • App Development
  • Apple
  • Area Codes
  • Automobile
  • Blogging
  • Business
  • Chemistry
  • Computing
  • Cryptocurrency
  • Designing
  • Ecommerce
  • Education
  • Electronics
  • Entertainment
  • Event Planning
  • Fashion and Style
  • Food & Recipes
  • Gadgets
  • Gaming
  • Health
  • Hobbies And Crafts
  • Holidays
  • Home & Kitchen
  • Home Decor
  • Home Improvement
  • How to
  • Industry
  • Infographic
  • Insurance
  • Internet
  • Internet Marketing
  • iOS
  • iPhone
  • Jobs & Careers
  • Law
  • Legal
  • Lifestyle
  • Make Money
  • Mobile Apps
  • Mobiles
  • Outsourcing
  • Parenting
  • People & Relationships
  • Personal Finance
  • Pets and Animals
  • Photography
  • Politics
  • Programming
  • Quotes
  • Real Estate
  • Science & Environment
  • Security
  • SEO
  • Shopping
  • Social Networking
  • Softwares
  • Sports
  • Technology
  • Tips and Tricks
  • Top 10
  • Trading & Investing
  • Travel
  • TV Series
  • Uncategorized
  • Web Design
  • Web Development
  • Web Hosting
  • WordPress
  • WordPress Themes
  • Writing & Translation
DMCA.com Protection Status
Popular Articles

How To Stop The Dogs From Destructive Chewing

January 8, 2025

Tips On Resolving Consistent Problems With Network Downtime

October 14, 2024

Great Shopping Offers for the Techies

August 18, 2024

Gainer or Protein – What To Choose?

July 28, 2024
Recent Comments
  • thomas on Why Should Businesses In 2022 Adopt Cloud Storage Solutions?
  • Novels In Tamil on 5 Cyber Threats To Look At In 2021
  • Stephen Curry on Tips to Keep Your Data Safe In Seagate Hard Drive
  • Gary Rice on Where is the 844 area code Location?
Recent Posts
  • Valentine Week List 2016 Dates Days Name Schedule Complete List
  • How to Watch NFL Games Online Free
  • 8 Best Smartphone Apps for Bikers or Cyclists
  • Can Instagram Become a Driver of Positive Social Influence?
  • Exploring the Rapid Rise In Popularity of NFTs
Random Articles

Exploring the Rapid Rise In Popularity of NFTs

June 10, 2025

Why A Website Is Critical for Small Businesses

June 5, 2025

Top 10 Reasons Startups Fail

June 4, 2025

Pulling off a Killer Presentation that Brands Your Business Among the Best

June 4, 2025
Copyright © 2013-2024. Tech Feast - All Rights Reserved. | Sitemap.
  • About Us
  • Contact Us
  • Advertise With Us
  • Privacy Policy
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.