SELECT LANGUAGE BELOW

The mystery behind those creepy ‘Unknown’ spam calls

Scammers are becoming increasingly sophisticated in their efforts to steal your sensitive information. One particularly worrying trend is the rise of targeted phone scams, where the caller has enough information to make it appear like a legitimate call, but in fact is Phishing in action For more information, please click here.

We recently received an email from James in Los Angeles detailing his unsettling experience with a series of suspicious phone calls. His story is a stark reminder of the importance of vigilance in protecting your personal information. Here's what James shared with us:

“I have received multiple random unknown calls in the past two months. Always first, the caller calls me (listed as unknown) and gives my full name. Absolutely true. Then they ask if I'm that person by that name from (insert city). And when I say no, you're the wrong person, they give me my date of birth and ask if it's me. Of course not. They then politely apologize, say thank you and hang up. At that point, you realize they didn't tell you who they represent. Maybe I'm paranoid, but it just seems weird.”

James' experience is not uncommon. Numerous similar incidents have been reported across the country in which callers appear to have only partial personal information and then ask to confirm or elaborate. This technique, known as “social engineering,” is a common way scammers gain trust and extract valuable data.

For security alerts and expert tips, sign up for KURT's newsletter, The Cyberguy Report.

Woman talking on a mobile phone. (Kurt “Cyberguy” Knutson)

Where do scammers get their information?

The mystery behind these creepy “unknown” spam calls is often Data Breach Or data leaks. Scammers obtain partial information from various sources, such as public records, social media profiles, or purchased data. Dark WebThis incomplete data is then used as a starting point for a phishing attack, aiming to fill in the gaps and create a more complete profile of the target.

Man on the phone

Man talking on a mobile phone. (Kurt “Cyberguy” Knutson)

Massive health savings account data breach puts 4.3 million Americans at risk

Understanding the scammers' methods

Let's analyze the tactics used on these calls.

Partial knowledge: Scammers start with the right information, like your name and city. This creates the illusion of legitimacy and can catch you off guard. But they Phishing Details such as date of birth.

Verification Request: Scammers will try to gather more valuable personal information by asking you to verify additional details, such as your date of birth.

Ambiguous Identity: Callers never identify themselves or their organization, making it difficult to verify their legitimacy or report them later.

Polite Exit: Hanging up quickly and politely will give the recipient the impression that nothing suspicious is going on and will reduce the likelihood of immediate suspicion or action being taken.

These tactics are carefully crafted to exploit human psychology: the initial correct information builds trust, the request for confirmation seems reasonable, and the polite exit makes the recipient ultimately feel good.

Man sitting with a phone

Man talking on a mobile phone. (Kurt “Cyberguy” Knutson)

World's largest database of stolen passwords uploaded to crime forum

The dangers of collecting information

You may be wondering: “What harm could there be in checking my date of birth?” Unfortunately, even a small piece of information can be dangerous if it falls into the wrong hands. Scammers use these details for the following purposes:

  • Creating a more complete profile for identity theft
  • Access your account or reset your password
  • Impersonating you for any other fraudulent or deceptive activities
  • Selling your information Dark Web

Data is a valuable commodity these days and any personal information should be carefully protected.

Woman talking on the phone

Woman talking on a mobile phone. (Kurt “Cyberguy” Knutson)

Massive Dell Data Breach Affects 49 Million Users — Privacy and Security Implications

8 steps to protect your personal information

Given how sophisticated scammers are, it's important to protect your personal information. Here are some steps you can take:

1. Don't share information with unknown callers

It is important to never provide personal information over the phone to someone you do not know. Always use caller ID and do not answer calls from numbers you do not recognize. If you do answer the phone, do not confirm or deny the information the caller claims to have. Be especially wary of callers who try to manipulate you by creating a sense of urgency or using fear.

Man talking on the phone

Man talking on a mobile phone. (Kurt “Cyberguy” Knutson)

2. Verify the caller's identity

If you receive a suspicious phone call, ask for the caller's name, the name of their company, and a call-back phone number. But before you call back right away, take the time to do your own research on the company. Look up their official contact information online and call the number to see if the initial call is legitimate.

Another woman talking on the phone

Woman talking on a mobile phone. (Kurt “Cyberguy” Knutson)

3. Enable spam blocking

To further protect yourself, enable spam blocking features on your phone. Call blocking app This allows us to screen calls and identify potential spam.

In addition, periodically Update your phone's operating system You can be sure you'll benefit from the latest security features and protection.

What is Artificial Intelligence (AI)?

4. Report suspicious activity

If you encounter any suspicious calls, it's important to report them to your mobile operator, and you can also file a complaint. Federal Trade Commission (FTC) If you believe you have been the victim of a scam, please consider reporting the incident to your local law enforcement to help protect yourself and others in your community.

A woman wearing a purple hat talking on the phone

Woman talking on a mobile phone. (Kurt “Cyberguy” Knutson)

5. Delete your personal information from the internet

To reduce your online presence, consider using a data removal service. While no service can guarantee that your data will be completely removed from the Internet, a data removal service is a really smart choice. It's not cheap, but then again, neither is privacy. These services do all the work for you by actively monitoring and systematically removing your personal information from hundreds of websites.

This has been a reassuring method for me and has proven to be the most effective way to wipe personal data from the internet. Limiting the information available reduces the risk of scammers cross-referencing data from a breach with information they find on the dark web, making it harder for them to target you. Check out my recommendations for data deletion services here. Additionally, get into the habit of regularly Google your name and phone number to see what information is publicly available about you.

Click here to get FOX Business on the go

6. Use identity theft protection services

Identity theft companies monitor personal information like Social Security numbers (SSNs), phone numbers, and email addresses to alert you if it's being sold on the dark web or used to open accounts. They can also help you freeze bank and credit card accounts to prevent further fraud by criminals.

One of the biggest benefits of using some services is that they may include up to $1 million in identity theft insurance to cover losses and legal costs, as well as a white glove fraud resolution team with U.S.-based case managers to help you recover your losses. Check out our tips and best choices for protecting yourself against identity theft.

7. Protect your account

To improve the security of your online accounts, use strong, unique passwords for each one and avoid using easily guessed information like your date of birth as your password. Password Manager You can generate and store complex passwords. Two-factor authentication Add extra security measures on your devices whenever possible.

8. Be careful with social media

When using social media, Privacy Settings Limit who can see your personal information: Scammers often use social media to gather information, so be careful about the details you share. Also, to reduce the risk of falling victim to a scam, avoid accepting friend requests or messages from people you don't know.

By taking these comprehensive steps, you can significantly reduce your risk of becoming a victim of telephone scams and identity theft. Remember, protecting your identity is an ongoing process that requires vigilance and regular attention.

Subscribe to KURT's YouTube channel for quick video tips on how to use all kinds of tech gadgets.

Important points about the cart

Scammers are constantly evolving their tactics, so it's important that we always stay one step ahead. James' experience serves as a wake-up call for us all: it's not enough to be careful; it's important to be proactive and defend your personal data.

Remember, every piece of information you share, no matter how small, can be a piece of a scammer's puzzle. Your date of birth, the city you live in, and even your social media posts – these are all potential weapons in a scammer's arsenal. But don't let fear paralyze you – instead, use it to your advantage and take control of your digital footprint.

Click here to get the FOX News app

By taking the steps outlined here, from being vigilant about your calls to wiping your data and using identity protection services, you can not only protect yourself, but also make it harder for scammers to operate and prevent others from falling victim to you.

What's the most unusual or subtle scam you've come across, and how did you deal with it? Your experience might help others who encounter a similar scam in the future to recognize and avoid it. Cyberguy.com/Contact Us

If you want to receive more of my tech tips and security alerts, subscribe to the free CyberGuy Report newsletter at the link below. Cyberguy.com/Newsletter

Have a question for Kurt or tell us the story you'd like to see featured?.

Follow Kurt on his social channels:

Answers to the CyberGuy's most frequently asked questions:

New Arrivals from Cart:

Copyright 2024 CyberGuy.com. All Rights Reserved.

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

Related News