Alltech IT Solutions Blog

Sick of Spam Calls? VoIP is Partly to Blame

Sick of Spam Calls? VoIP is Partly to Blame

If you have access to a phone, chances are you’ve received a spammy robocall. In fact, you’ve probably received a bunch… but why? And how are these robocalls able to hide behind what looks to be a local number? Unfortunately, it’s because the scammers behind these robocalls are using a helpful business tool… Voice-over-Internet-Protocol telephony, also known as VoIP.

How Spam Callers Are Leveraging VoIP

While VoIP makes an excellent telephony solution for businesses, phone scammers can use it to their own advantage. As VoIP leverages the Internet to place calls, it has become remarkably easy for scammers to work around the call blocks that used to be an effective means of stopping them.

This is because VoIP allows cybercriminals to imitate any number they want, through a process known as spoofing. The scariest part is how there is nothing to stop these spoofed calls in the current telephone infrastructure. Well, maybe that isn’t the scariest part.

It may be a little more scary to think about how scammers and hackers can spoof a number from your neighborhood, increasing the likelihood that you’ll answer. You can even receive a spoofed call from your own number.

Common Scams, and Frequently Targeted Areas

Of course, this doesn’t mean that a VoIP scammer will necessarily call you. Sure, some will - one common scam involves a scammer calling your hotel room posing at the front desk to confirm your credit card details. More frequently, these scammers will leverage automation to assist with their scams. Hundreds of potential victims will be robocalled with a spoofed number, and only those who pick up will be interacted with.

Different areas around the world are targeted by these scams more often. The top ten countries for phone spam break down as follows, based on the percentage of all calls that are spam.

  1. Spain, with 24 percent.
  2. The United Kingdom, with 22 percent.
  3. Italy, with 21 percent.
  4. France, with 20 percent.
  5. Argentina, with 10 percent.
  6. The United States, with 10 percent.
  7. Mexico, with 9 percent.
  8. Brazil, with 9 percent.
  9. Chile, with 9 percent.
  10. Australia, with 6 percent.

This is considering that, in the United States, there was a 46 percent increase in robocall spam in 2018. For whatever reason, within the United States, seven of the top ten targeted areas are in Texas, including Austin, Dallas, and Houston.

Can These Calls Be Stopped?

With any luck, yes. Google has begun to implement a preventative process utilizing its Google Assistant. When a call is received, the Assistant answers, asks for the reason of the call, and provides a transcript of the response so the recipient of the call knows whether or not to answer. This all happens on the device, keeping your calls private.

The FTC has also been commanded to put a stop to these calls, including approving another Google technology, STIR/SHAKEN (Secure Telephone Identity Revisited/Signature-based Handling of Asserted information using toKENs) which would authenticate calls by confirming the number is associated with the device making the call, and therefore is presumably from the owner of the phone number.

How often do you receive these kinds of calls? How happy would you be if they were stopped? Tell us what you think in the comments!

Looking for Value? Look No Further
Tip of the Week: Five of Android Pie’s Tastier Fea...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 24 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

IT Services Collaboration Shortcut Threat Dongle Apps Edge BYOD Hosted Solution Risk Management Managed IT Services GDPR Telecommuting Employees Tip of the week Analytics Settings Samsung Wireless Internet Printing Artificial Intelligence Time Management Tech Support Smartphone Internet Explorer Internet Conferencing Health Computers Recycling Passwords National Security Specifications Vulnerabilities Business Continuity Law Enforcement Twitter Two-factor Authentication WannaCry Spotify Server Management Bandwidth Display Maintenance Paperless Office OneNote Physical Security Content Filtering Going Green Hardware Wi-Fi Office Tips Voice over IP Government WhatsApp DDoS Big Data App Cybersecurity Internet of Things Gadget Document Management VoIP Save Money Paste Lead Generation Workers Proactive IT Business Computing Tech Terms Outsourced IT Biometrics Payment Cybercrime Mobile Security Dark Data Alerts Scalability Reporting Virtual Assistant CrashOverride Processors Mobile Device Management Telephony Thank You Error Cryptocurrency HaaS Microsoft Teams Sports Mobile Devices Printer Server Managed IT Services Eliminating Downtime Telephone Systems Updates Current Events Yahoo Password Tip of the Week File Sharing Data Security Chrome OS Managed Service Troubleshooting Facebook Backup and Disaster Recovery Connectivity Hosted Solutions Smartphones Medical IT Hard Disk Drive Spyware Downloads Company Culture Cost Management Browser Security Computer Care Amazon Data iPhone Information Technology Update SSD Access Control Email Regulation Business Management Windows XP Webcam Technology Tips G Suite Windows 7 Leadership Wireless BDR Operating System User Tip Autocorrect Budget Cortana Tech Term Search Data Backup Telephone System Ink Remote Monitoring and Management Excel Copy instant Messaging Privacy Microsoft Office E-Commerce Business Intelligence Quick Tips Credit Cards Employer-Employee Relationship Gmail Email Management Network Attached Storage Plug-In Managing Stress How To Virus VPN IT Management Education Network Security Workplace Tips VoIp Botnet IT Support Server Innovation Travel Laptop Wireless Charging Printer Network Taskbar Data Protection Business Technology Emergency Upgrade Cloud Computing Employee-Employer Relationship Windows Processor Marketing Voice over Internet Protocol Cleaning Small Business Communication Work/Life Balance Applications Instagram Recovery Disaster Recovery Cables Backup Machine Learning IT budget Remote Support Congratulations Telecommute Value eCommerce A.I. Worker Cloud News Miscellaneous Android Holiday Inventory Electronic Health Records Users Technology Communications Batteries Staff e-waste Windows 10 Managed IT Security Cameras Patch Management Benchmarks Help Desk Online Shopping Files Office 365 Synergy Printers Staffing Scam Productivity Saving Money Hard Drive Best Practices Dark Web Paper Hacker Remote Computing Software disposal Virtualization Apple Unified Communications Certification Financial Authentication Hybrid Cloud Data Recovery Managed Service Provider Comparison Website The Internet of Things Training Solid State Drive Outlook Google Profitability eWaste Ransomware Remote Monitoring Video Streaming Media Storage Unified Threat Management Mobile Device Authorization Router Emoji Networking Safety Millennials Social Media HIPAA Remote Control Encryption Data loss Digital Google Drive Hiring/Firing Mobility Television Websites Tablet Bring Your Own Device Employer Employee Relationship Customer Service Cabling Google Maps IaaS Phone System Net Neutrality Freedom of Information Entertainment Spam Blocking Movies Business Microsoft Office 365 WiFi Hard Drives Windows 10 Gadgets Gaming Console Wearables Automation Microsoft Retail Politics Analysis Live Streaming Antivirus Knowledge Computer Environment PowerPoint HP Efficiency Money Automobile Battery Hacking Touchscreen Information Healthcare Data Management Vulnerability Blockchain Smart Technology Vendor Management IT Support Alert RAM Access Human Resources Licensing Multi-Factor Security Malware Data Breach Chrome Productivity Trends Word Database Sales Personal Information Office Video Games SaaS Hackers Compliance User Tips Windows Server 2008 R2 Managed IT Service Tactics Scheduling Phishing User Security Spam Avoiding Downtime