Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers Targeting Amazon Users

Scammers Targeting Amazon Users

It’s the holiday season, and with it comes a multitude of hackers trying to cash in on everyone’s online purchases. These phishing scams always increase when the holiday season comes around, so it’s best to stay vigilant so that you don’t give yourself the gift of sadness this year. One such threat is already here, and it’s voice spoofing of Amazon orders.

In this case, an email scam is circulating which encourages users to call a number listed to confirm an order, usually one with a large price. This nasty trick is intended to harvest phone numbers and credit card numbers for later exploitation. Security researchers Avanan have found that the contact number listed on the email is not Amazon; it is instead a scammer who records the phone number with Caller ID. Afterwards, the user will be contacted by the scammer, who requests that the user provide financial information in order to cancel the order.

We think enough people are familiar with Amazon now to determine that there are several red flags with this scenario. First of all, you know how to cancel an Amazon order; just log into your account and do it from there. Second, if you placed an order with Amazon, why would you have to reconfirm your financial information when it is already on file? It just doesn’t make sense, and that’s the point we are trying to make. A lot of these issues can be resolved simply by slowing down, taking a step back, and not rushing to conclusions or to resolve a problem that does not exist.

Scams involving online retailers are nothing new, but this particular scam is notable because the emails that get sent out are able to make it past spam blockers and content filters. It does this by including legitimate links within the body of the email, meaning that your email solution doesn’t necessarily flag it immediately.

We offer the following advice to you:

  • Don’t call numbers you don’t recognize.
  • Don’t click on suspicious links in your email inbox.
  • Don’t give out your personal information or credit card information just because someone on the phone told you to.
  • Check the sender for any message you feel is suspicious to ensure it is legitimate.
  • Check your account before responding to any correspondence from the sender.
  • Set up multi-factor authentication, just in case.

Stay safe this holiday season with Voyage Technology. We can help your business stay secure through advanced industry-standard security solutions designed to protect your organization. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 01 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Users Collaboration IT Services Hosted Solutions Mobile Device Ransomware Quick Tips Microsoft Workplace Strategy Small Business Cybersecurity Data Backup Passwords Communication Smartphone Backup Saving Money VoIP Business Management Android Smartphones Mobile Devices Upgrade communications Disaster Recovery Managed Service Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Remote Tech Term Network Internet of Things Productivity Automation Artificial Intelligence Current Events Facebook Covid-19 Cloud Computing Remote Work Server Managed Service Provider Miscellaneous Gadgets Outsourced IT Information Holiday Spam AI Employee/Employer Relationship Encryption Windows 10 Training Office Business Continuity Compliance Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Apps Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship Chrome Budget Mobile Device Management Apple Networking Gmail App Managed Services Voice over Internet Protocol Vendor Access Control Office 365 Hacker Tip of the week Conferencing Avoiding Downtime Marketing How To BDR WiFi BYOD Computing Applications Information Technology Health Help Desk Analytics Computers Office Tips IT Support Augmented Reality Retail Storage Website Password Bring Your Own Device Managed IT Services Healthcare Operating System Big Data HIPAA Router Virtual Private Network Risk Management Windows 7 Printer Paperless Office Infrastructure Microsoft 365 Customer Service Monitoring Solutions Document Management Telephone Windows 11 Scam Data loss 2FA Firewall Cooperation Excel Going Green Patch Management Save Money Remote Workers The Internet of Things Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Social Free Resource Display Project Management Computer Repair Mobile Security Images 101 Processor Customer Relationship Management Multi-Factor Authentication Mobility Virtual Desktop LiFi Data storage Smart Technology Hacking Presentation Outlook Machine Learning Employees Money Saving Time Humor Wireless Technology Integration Managed IT Service Maintenance Downloads Antivirus Sports Holidays Mouse Word Licensing Data Storage Administration Supply Chain Entertainment Video Conferencing Managed Services Provider Virtual Machines Professional Services Robot Safety Telephone System Cost Management Settings Wireless Printing Content Filtering iPhone IT Management VPN YouTube Meetings Physical Security Vulnerabilities Data Privacy Cryptocurrency User Tip Modem Unified Communications Database Experience IT Assessment IT Maintenance Google Docs Value Business Intelligence Bitcoin Network Management Running Cable Tech Support IT Technicians Flexibility Monitors Cyber Monday Organization Shortcuts Google Wallet Proxy Server Cookies Competition Tactics Hotspot Digital Security Cameras Smart Devices Ransmoware Memory Vendors Windows 8 Laptop Websites Mirgation Remote Working Data Breach Google Play Be Proactive Drones Nanotechnology Addiction Electronic Medical Records Language Videos Electronic Health Records Workforce SharePoint Wasting Time Threats Management User Halloween Chatbots Writing Distributed Denial of Service Trend Micro Security Cameras Workplace Strategies Lenovo Screen Reader Service Level Agreement Virtual Reality Computing Infrastructure Software as a Service Meta Managing Costs Amazon IP Address Hacks Server Management Scary Stories Private Cloud Identity Identity Theft Smart Tech Fun eCommerce SSID Superfish Bookmark Virtual Assistant Outsource IT Deep Learning Download Twitter Alerts Surveillance Virtual Machine Environment Media Recovery Error Education Connectivity Social Engineering Break Fix Reviews Medical IT Browsers Hard Drives Transportation Small Businesses Domains Upload Remote Computing Development Multi-Factor Security Hypervisor Displays Mobile Computing Social Network Tablet IoT Search Dark Web Shopping Optimization PowerPoint Refrigeration Employer/Employee Relationships Outsourcing Public Speaking Best Practice Trends Alert Dark Data Google Calendar PCI DSS Lithium-ion battery Navigation Managed IT Customer Resource management Buisness File Sharing Regulations IT solutions Star Wars Entrepreneur How To Microsoft Excel Gig Economy Workplace Legal Data Analysis Teamwork Hiring/Firing Business Growth Gamification Notifications Staff Internet Service Provider Legislation Regulations Compliance Evernote Paperless Travel Social Networking Google Maps Cortana Memes Co-managed IT Techology Fileless Malware Undo SQL Server Technology Care Alt Codes Content Wearable Technology Net Neutrality Comparison Financial Data History Business Communications Health IT Downtime Unified Threat Management Motherboard Hosted Solution Assessment Permissions Smartwatch IT Scams Unified Threat Management Directions Azure Hybrid Work Typing Procurement Network Congestion Specifications Telework Cyber security Tech Human Resources Application Internet Exlporer Knowledge Fraud CES Communitications Cables Google Drive User Error Microchip IBM Username Supply Chain Management 5G Black Friday FinTech Term Google Apps Point of Sale

Blog Archive