Alltech IT Solutions Blog

Sick of Spam Calls? VoIP is Partly to Blame

Sick of Spam Calls? VoIP is Partly to Blame

If you have access to a phone, chances are you’ve received a spammy robocall. In fact, you’ve probably received a bunch… but why? And how are these robocalls able to hide behind what looks to be a local number? Unfortunately, it’s because the scammers behind these robocalls are using a helpful business tool… Voice-over-Internet-Protocol telephony, also known as VoIP.

How Spam Callers Are Leveraging VoIP

While VoIP makes an excellent telephony solution for businesses, phone scammers can use it to their own advantage. As VoIP leverages the Internet to place calls, it has become remarkably easy for scammers to work around the call blocks that used to be an effective means of stopping them.

This is because VoIP allows cybercriminals to imitate any number they want, through a process known as spoofing. The scariest part is how there is nothing to stop these spoofed calls in the current telephone infrastructure. Well, maybe that isn’t the scariest part.

It may be a little more scary to think about how scammers and hackers can spoof a number from your neighborhood, increasing the likelihood that you’ll answer. You can even receive a spoofed call from your own number.

Common Scams, and Frequently Targeted Areas

Of course, this doesn’t mean that a VoIP scammer will necessarily call you. Sure, some will - one common scam involves a scammer calling your hotel room posing at the front desk to confirm your credit card details. More frequently, these scammers will leverage automation to assist with their scams. Hundreds of potential victims will be robocalled with a spoofed number, and only those who pick up will be interacted with.

Different areas around the world are targeted by these scams more often. The top ten countries for phone spam break down as follows, based on the percentage of all calls that are spam.

  1. Spain, with 24 percent.
  2. The United Kingdom, with 22 percent.
  3. Italy, with 21 percent.
  4. France, with 20 percent.
  5. Argentina, with 10 percent.
  6. The United States, with 10 percent.
  7. Mexico, with 9 percent.
  8. Brazil, with 9 percent.
  9. Chile, with 9 percent.
  10. Australia, with 6 percent.

This is considering that, in the United States, there was a 46 percent increase in robocall spam in 2018. For whatever reason, within the United States, seven of the top ten targeted areas are in Texas, including Austin, Dallas, and Houston.

Can These Calls Be Stopped?

With any luck, yes. Google has begun to implement a preventative process utilizing its Google Assistant. When a call is received, the Assistant answers, asks for the reason of the call, and provides a transcript of the response so the recipient of the call knows whether or not to answer. This all happens on the device, keeping your calls private.

The FTC has also been commanded to put a stop to these calls, including approving another Google technology, STIR/SHAKEN (Secure Telephone Identity Revisited/Signature-based Handling of Asserted information using toKENs) which would authenticate calls by confirming the number is associated with the device making the call, and therefore is presumably from the owner of the phone number.

How often do you receive these kinds of calls? How happy would you be if they were stopped? Tell us what you think in the comments!

Looking for Value? Look No Further
Tip of the Week: Five of Android Pie’s Tastier Fea...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 07 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.alltechits.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Ransomware Excel Covid-19 Unified Communications Money Synergy Computers Eliminating Downtime Managed Service Wireless Charging File Management Managed IT Service Two-factor Authentication Connectivity Regulation Botnet App Employer Employee Relationship Data loss Plug-In Update Project Management Processor Communications Workers Settings Employee-Employer Relationship Mobility BYOD Edge Windows 7 Virtualization Cloud Congratulations Files Webcam Cloud Computing Tip of the Week Telephony Freedom of Information Alerts Millennials Cables Cleaning OneNote Microsoft IT Services Payment Emergency Apple Networking e-waste Gadget Data Hosted Desktop CrashOverride Business Management Firewall Information Managing Stress Politics Human Resources Virus Office A.I. Technology Payment Cards Miscellaneous Internet Explorer Display Server Going Green Business Document Management Wireless Battery Holidays News Google Drive Mobile Device Data Breach Worker Data Protection Gmail Users Remote Monitoring and Management Mobile Devices Scheduling Customer Relationship Management Business Computing Thank You SaaS Current Events HIPAA Licensing Net Neutrality Multi-Factor Security Dark Web Save Money IT budget Internet Customer Service Hard Disk Drive Patch Management WiFi G Suite Conferencing Malware Hard Drive Password User Tips Batteries Marketing Disaster Recovery Training Microsoft Office 365 Employees Taskbar Small Business Education Gaming Console Scams Bitcoin HaaS HP Yahoo Staff Benchmarks Help Desk Virtual Assistant SSD VoIp Hiring/Firing Certification Tech Term Lead Generation Software eCommerce Tip of the week Website Spyware Medical IT Live Streaming Network Attached Storage Smartphones Employer-Employee Relationship Memes Comparison Access Control Analytics Workplace Tips Television Internet of Things Multi-Factor Authentication Outlook Managed IT Analysis Mobile Security Credit Cards Authentication Trends Electronic Health Records VoIP Collaboration Office Tips Database BDR Innovation Access Digital Machine Learning Artificial Intelligence Quick Tips Managed IT Services Movies Network Security Computer Care Holiday Autocorrect Threats Automobile Business Continuity Bandwidth Unified Threat Management Compliance Cybercrime Shortcut Specifications Security Cameras Personal Information Hybrid Cloud Printer IT Data Security Applications Saving Money Browser Information Technology Tech Support Alert Hosted Solutions Security Virtual Reality Vulnerabilities Mobile Device Management Passwords Proactive IT Smart Technology The Internet of Things Router Best Practices Cybersecurity Budget Recycling Windows 10 Google Storage Touchscreen Leadership Backup Managed IT Services Sports Websites Cost Management Streaming Media Voice over IP Big Data Processors instant Messaging Error Authorization Hosted Solution Cryptocurrency Printing How To Facebook RAM Bring Your Own Device Retail Recovery File Sharing IT Support Hacking Profiles Blockchain Windows 10 DDoS Spam Spotify Business Intelligence Telecommuting Managed Service Provider Data Management Email Productivity Technology Tips Amazon Remote Support Health Google Maps Knowledge Laptop Smartphone Android Insurance Scalability WhatsApp Work/Life Balance Telephone System Environment Windows XP Operating System Communication Video Online Shopping Law Enforcement Windows Server 2008 R2 Troubleshooting Business Technology Dark Data Privacy Financial Upgrade Maintenance Printers Reporting Tablet Instagram Backup and Disaster Recovery Email Management Antivirus Cortana User Security Hardware VPN Government PowerPoint National Security Remote Control Phone System Management Time Management Downloads Apps Phishing Emoji User Tip Value Wearables Voice over Internet Protocol Gadgets Staffing Sales Managed Services Provider WannaCry Data Recovery Tech Terms Copy E-Commerce Profitability Paperless Office Telephone Systems Paper Risk Management Telecommute Encryption Samsung Travel Physical Security Remote Monitoring iPhone Data Backup Company Culture Wi-Fi Distribution Microsoft Office Biometrics Chrome OS Humor Hard Drives Social Media Safety Threat Remote Workers Mobile Office Solid State Drive Dongle Vendor Management Network Scam Chrome Automation Remote Avoiding Downtime Hackers Vulnerability Windows Social Network eWaste Word Fleet Management IaaS GDPR Paste Tactics IT Management Virtual Private Network Inventory Mobile IT Support Efficiency Co-Managed IT Server Management Vendor Office 365 Shadow IT Hacker disposal Entertainment Printer Server Cabling Content Filtering Twitter Microsoft Teams Updates Wireless Internet Computer Productivity Remote Computing Healthcare Outsourced IT Spam Blocking Video Games Search Ink