• About Us
  • Privacy Policy
  • DMCA
  • Editorial Policy
  • Contact Form
Friday, December 5, 2025
  • Login
No Result
View All Result
NEWSLETTER
BOB fm
  • Home
  • Top News
  • World
  • Economy
  • science
  • Technology
  • sport
  • entertainment
  • Contact Form
  • Home
  • Top News
  • World
  • Economy
  • science
  • Technology
  • sport
  • entertainment
  • Contact Form
No Result
View All Result
BOB fm
No Result
View All Result
Home Economy

Users should be wary of “unusual requests for sensitive data”

Ursula Curtis by Ursula Curtis
May 18, 2024
in Economy
0
Users should be wary of “unusual requests for sensitive data”
0
SHARES
36
VIEWS
Share on FacebookShare on Twitter

WCalling international numbers or sending fraudulent messages with job offers are among the methods used in cyber attacks.

“Cyberattacks that use a cell phone as an attack surface, whether through SMS or phone calls, are not new,” says an official source from CNCS, when contacted by Lusa.

However, “in recent years, there have been a large number of cases of this type, particularly associated with the types of ‘phishing/SMS phishing’ and social engineering incidents (which include ‘phishing’), which are carried out with the aim of collecting Sensitive information and carrying out fraud operations against potential victims, exploiting the vulnerabilities of the human factor,” says the same source.

Phishing is a type of attack in which social engineering techniques are used to obtain sensitive information from the victim. Using “Mail”. When this technique is used via SMS, it is called “Smishing,” and by phone (voice), it is called “phishing,” according to information on the CNCS website.

“Some, though not all, of the instances listed in these forms are consistent with the fraudulent phone calls and messages described, specifically some instances of ‘phishing’ and ‘phishing,’” an official CNCS source continues, responding to Lusa, noting that, “ Year after year, phishing and social engineering incidents were among the most recorded by CERT.PT,” as can be seen in the CNCS Cybersecurity Observatory’s Risks and Conflicts report.

The National Cyber ​​Security Center states that the goal of these campaigns varies: “In some cases the goal is to lure the victim into “acting” as a “money mule,” receiving money or crypto assets into their accounts and then transferring them to other accounts, making it difficult to identify the target account. “

In other cases, “the goal is to collect personal and banking data and/or make illicit bank transfers,” and “in almost all cases, there is a strong possibility that victims’ devices have been compromised,” the National Cybersecurity Commission warns.

Therefore, the CNCS “advises good practices against ‘phishing’, ‘SMS phishing’ and ‘pharming’, as well as those regarding precautions to take with instant messaging.”

In general, “users should be wary of unusual requests for sensitive data or that trigger critical actions via mobile,” CNCS advises.

Moreover, “they should think twice before accepting any proposal that is considered too good, perhaps ‘too good to be true’,” the same source concludes.

Read also: Cyberattack puts data of thousands of Helsinki residents at risk

Are you thinking about buying an electric car but have miles of doubt?  Santogal explains

The APP was voted Product of the Year

Download our free app.

Consumer’s Choice for the eighth consecutive year in online journalism and the 2024 Producer of the Year.
*Study by e Netsonda, November. And ten. Product of the Year 2023 – pt.com

Download Google Play
Download Apple Store
The APP was voted Product of the Year

Download our free app.

Consumer’s Choice for the eighth consecutive year in online journalism and the 2024 Producer of the Year.
*Study by e Netsonda, November. And ten. Product of the Year 2023 – pt.com

Download Google Play
Download Apple Store
Ursula Curtis

“Writer. Analyst. Avid travel maven. Devoted twitter guru. Unapologetic pop culture expert. General zombie enthusiast.”

Ursula Curtis

Ursula Curtis

"Writer. Analyst. Avid travel maven. Devoted twitter guru. Unapologetic pop culture expert. General zombie enthusiast."

Next Post
McDonald’s: Mental health campaign gives children a voice;  to see

McDonald's: Mental health campaign gives children a voice; to see

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Navigate

  • Home
  • Top News
  • World
  • Economy
  • science
  • Technology
  • sport
  • entertainment
  • Contact Form

Pages

  • About Us
  • Privacy Policy
  • DMCA
  • Editorial Policy
  • Contact Form
  • About Us
  • Privacy Policy
  • DMCA
  • Editorial Policy
  • Contact Form

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • About Us
  • Contact Form
  • DMCA
  • Editorial Policy
  • Privacy Policy

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.