Alltech IT Solutions Blog

Sick of Spam Calls? VoIP is Partly to Blame

Sick of Spam Calls? VoIP is Partly to Blame

If you have access to a phone, chances are you’ve received a spammy robocall. In fact, you’ve probably received a bunch… but why? And how are these robocalls able to hide behind what looks to be a local number? Unfortunately, it’s because the scammers behind these robocalls are using a helpful business tool… Voice-over-Internet-Protocol telephony, also known as VoIP.

How Spam Callers Are Leveraging VoIP

While VoIP makes an excellent telephony solution for businesses, phone scammers can use it to their own advantage. As VoIP leverages the Internet to place calls, it has become remarkably easy for scammers to work around the call blocks that used to be an effective means of stopping them.

This is because VoIP allows cybercriminals to imitate any number they want, through a process known as spoofing. The scariest part is how there is nothing to stop these spoofed calls in the current telephone infrastructure. Well, maybe that isn’t the scariest part.

It may be a little more scary to think about how scammers and hackers can spoof a number from your neighborhood, increasing the likelihood that you’ll answer. You can even receive a spoofed call from your own number.

Common Scams, and Frequently Targeted Areas

Of course, this doesn’t mean that a VoIP scammer will necessarily call you. Sure, some will - one common scam involves a scammer calling your hotel room posing at the front desk to confirm your credit card details. More frequently, these scammers will leverage automation to assist with their scams. Hundreds of potential victims will be robocalled with a spoofed number, and only those who pick up will be interacted with.

Different areas around the world are targeted by these scams more often. The top ten countries for phone spam break down as follows, based on the percentage of all calls that are spam.

  1. Spain, with 24 percent.
  2. The United Kingdom, with 22 percent.
  3. Italy, with 21 percent.
  4. France, with 20 percent.
  5. Argentina, with 10 percent.
  6. The United States, with 10 percent.
  7. Mexico, with 9 percent.
  8. Brazil, with 9 percent.
  9. Chile, with 9 percent.
  10. Australia, with 6 percent.

This is considering that, in the United States, there was a 46 percent increase in robocall spam in 2018. For whatever reason, within the United States, seven of the top ten targeted areas are in Texas, including Austin, Dallas, and Houston.

Can These Calls Be Stopped?

With any luck, yes. Google has begun to implement a preventative process utilizing its Google Assistant. When a call is received, the Assistant answers, asks for the reason of the call, and provides a transcript of the response so the recipient of the call knows whether or not to answer. This all happens on the device, keeping your calls private.

The FTC has also been commanded to put a stop to these calls, including approving another Google technology, STIR/SHAKEN (Secure Telephone Identity Revisited/Signature-based Handling of Asserted information using toKENs) which would authenticate calls by confirming the number is associated with the device making the call, and therefore is presumably from the owner of the phone number.

How often do you receive these kinds of calls? How happy would you be if they were stopped? Tell us what you think in the comments!

Looking for Value? Look No Further
Tip of the Week: Five of Android Pie’s Tastier Fea...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, June 25 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Company Culture Wi-Fi Avoiding Downtime Scam Environment Voice over Internet Protocol Telecommute Remote Monitoring Television e-waste HP National Security Law Enforcement Printer Tip of the Week Microsoft Office 365 Operating System Safety Router Virus Software Hard Drive Hard Drives Google Maps Word Managed IT Services Medical IT Employee-Employer Relationship Microsoft Office Hacking Proactive IT Managing Stress Mobile Devices Hybrid Cloud Backup Botnet Emoji Excel Wireless Internet Congratulations Office Remote Control Browser Document Management Gaming Console Cleaning Managed Service Employer-Employee Relationship Business Computing Managed IT Data Management Facebook Authorization App Business Intelligence Touchscreen Gmail Tactics Patch Management Authentication Printing Updates Scalability File Sharing Wearables Google Drive Managed IT Service Employees Windows Server 2008 R2 Laptop Emergency Tech Terms Licensing Education User Security Windows 10 Holiday IT Management VoIp Update Samsung Hosted Solutions Cryptocurrency disposal VPN Productivity Synergy Tech Support Security Error Data Breach Comparison Movies Cost Management Scheduling Travel Downloads Marketing Cybersecurity Blockchain BDR Lead Generation Current Events Yahoo Government Microsoft Teams Phone System Content Filtering Small Business IT budget Staffing Computer Technology Tips Automation Connectivity Threat Windows 7 Miscellaneous eCommerce Spotify Technology Data Protection Antivirus Cortana Mobile Security Hackers Internet Explorer Profitability Specifications Webcam Conferencing Freedom of Information Workers Vulnerabilities Gadget Managed IT Services Electronic Health Records Help Desk Server Management Recovery Troubleshooting Retail Printer Server Office 365 BYOD Vulnerability Trends Virtualization Business Continuity Value Android Telecommuting The Internet of Things Leadership Website Storage IT Support Files Mobile Device Management Computers Twitter Smartphone Cloud Computing Unified Communications Smartphones Backup and Disaster Recovery Access Privacy Communications Entertainment Staff Telephone System Autocorrect Time Management Ink Security Cameras Automobile Internet Vendor Management GDPR HIPAA Spyware Cybercrime Applications Data Recovery Email Disaster Recovery Two-factor Authentication Save Money Email Management Ransomware Alert Best Practices Paperless Office Alerts Productivity PowerPoint Phishing Payment Worker Personal Information CrashOverride Knowledge Database Saving Money Data Security Digital Analysis Remote Computing Millennials Remote Monitoring and Management Computer Care Business Telephone Systems Network Attached Storage Solid State Drive Paste Voice over IP Malware Analytics Quick Tips Windows XP Employer Employee Relationship Chrome OS Apps Managed Service Provider Physical Security Hard Disk Drive Innovation VoIP Hardware Search Cabling Settings Collaboration Information Technology Dark Data Internet of Things Network Compliance Credit Cards Hosted Solution Eliminating Downtime Cables Spam Blocking Apple Spam Tablet Bandwidth iPhone Office Tips Printers RAM Multi-Factor Security Big Data Dark Web Inventory Edge Amazon WhatsApp Gadgets WannaCry Machine Learning HaaS SSD Telephony Windows 10 Outlook Business Management Certification Wireless Streaming Media Smart Technology instant Messaging Network Security Training Microsoft Google Reporting E-Commerce User Tip Human Resources DDoS IT Services G Suite Instagram News OneNote Wireless Charging Money Data Backup Server Encryption Processors Users Hiring/Firing Shortcut Passwords Networking SaaS Video Games Tech Term Access Control Thank You Biometrics Customer Service Upgrade Workplace Tips Windows Chrome Virtual Assistant Maintenance Remote Support Work/Life Balance Paper How To Video A.I. Outsourced IT Business Technology Budget Net Neutrality Password Mobility IT Support Regulation Sports Dongle Data loss Information Politics Taskbar Tip of the week Mobile Device User Tips Live Streaming Sales Battery Plug-In eWaste WiFi Unified Threat Management Efficiency Healthcare Data Cloud Communication Hacker IaaS Websites Online Shopping Artificial Intelligence Bring Your Own Device Health Copy Social Media