Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

VoIP Has a Spam Problem

VoIP Has a Spam Problem

Robocalls plague the world’s smartphone users, but have you ever stopped to ask why you receive them in the first place? Why are robocallers able to hide behind a local number so that you pick up the phone? Scammers are actually using a business tool you may have heard of… Voice over Internet Protocol, or VoIP, a modern phone solution that in the hands of anyone else is extremely helpful.

How Spam Callers Are Leveraging VoIP

VoIP is great for businesses, but scammers can use it to cause mischief in its own right. Since VoIP uses the Internet to place calls, scammers can work around the call blocks that used to be a way to block their attacks in the past.

VoIP gives cybercriminals the ability to imitate just about any number out there with a process called spoofing. One of the scariest parts about this is that spoofed calls cannot be stopped by the current telephone infrastructure, but it actually gets worse. Since hackers and criminals can spoof a number from your neighborhood, it’s more likely that you’ll answer. They can even spoof your own number, shockingly enough.

Common Scams and Frequently Targeted Areas

This doesn’t mean that a VoIP scammer will call you--all we’re trying to say is that it’s more accessible than it’s ever been before. Some of the more common scams involve a scammer calling a hotel room posing as the front desk to confirm credit card details. It’s much easier and more efficient for a scammer to pull off attacks through the use of automation. Hundreds of potential victims can be robocalled with a spoofed number, with only the ones who pick up the phone being interacted with.

Different areas of the world experience more trouble with spam attacks. The top ten countries for phone spam break down as follows:

  1. Spain, with 24 percent.
  2. The United Kingdom, with 22 percent.
  3. Italy, with 21 percent.
  4. France, with 20 percent.
  5. Argentina, with 10 percent.
  6. The United States, with 10 percent.
  7. Mexico, with 9 percent.
  8. Brazil, with 9 percent.
  9. Chile, with 9 percent.
  10. Australia, with 6 percent.

Furthermore, the United States saw a 46 percent increase in robocall spam in 2018. Among all locations within the U.S., the top ten targeted areas are in Texas, including Austin, Dallas, and Houston.

Can These Calls Be Stopped?

Google has begun the first steps to implement a preventative process utilizing its Google Assistant. When a call is received, the Assistant answers, asks for the reason for the call, and provides a transcript of the response. The recipient then knows whether or not the call is legitimate. This happens on the device, thus keeping your calls private.

The FTC has been given the task of stopping these calls, and steps have been taken to approving another Google technology, STIR/SHAKEN (Secure Telephone Identity Revisited/Signature-based Handling of Asserted information using toKENs), which can potentially authenticate calls by confirming the number is associated with the device making the call.

How often do you receive spoofed calls? What would you do to make them stop? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 01 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Collaboration IT Services Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Cybersecurity Microsoft Communication Passwords Data Backup Smartphone Backup Saving Money Business Management VoIP Smartphones Android Mobile Devices communications Upgrade Disaster Recovery Managed Service Browser Data Recovery Managed IT Services Social Media Microsoft Office Windows Remote Network Tech Term Internet of Things Artificial Intelligence Facebook Current Events Productivity Automation Cloud Computing Covid-19 Remote Work Miscellaneous Gadgets Server Managed Service Provider Outsourced IT Holiday Information Employee/Employer Relationship Encryption Spam AI Windows 10 Data Management Business Continuity Government Compliance Office Training Windows 10 Bandwidth Virtualization Wi-Fi Blockchain Business Technology Data Security Apps Two-factor Authentication Mobile Office Chrome Vendor Gmail Budget Apple Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol Mobile Device Management Applications WiFi How To BDR Conferencing BYOD Computing Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 Tip of the week Augmented Reality Router Retail Storage Password Bring Your Own Device Big Data Help Desk Managed IT Services Healthcare Operating System Computers Virtual Private Network Risk Management Website Health Office Tips Analytics IT Support HIPAA Firewall Document Management Windows 11 The Internet of Things Scam Data loss 2FA Monitoring Social Excel Going Green Patch Management Save Money Remote Workers Remote Monitoring Vulnerability Telephone End of Support Vendor Management Customer Service Cybercrime Cooperation Free Resource Display Project Management Windows 7 Printer Paperless Office Microsoft 365 Infrastructure Solutions Money Employees Integration Humor User Tip Modem Processor Mobile Security Safety Maintenance Antivirus Sports Holidays Mouse Data Storage Smart Technology Supply Chain Administration Video Conferencing Managed Services Provider Virtual Machines Professional Services Saving Time Robot Managed IT Service Customer Relationship Management Settings Downloads Printing Wireless Content Filtering iPhone Hacking IT Management Licensing Presentation VPN YouTube Meetings Physical Security Vulnerabilities Entertainment Cryptocurrency Data Privacy Wireless Technology Computer Repair Images 101 Mobility Virtual Desktop Telephone System Multi-Factor Authentication Cost Management Data storage LiFi Word Outlook Machine Learning Specifications Security Cameras Workplace Strategies Public Speaking Lenovo Writing Trend Micro Virtual Reality Internet Exlporer Software as a Service Fraud Meta Lithium-ion battery Microchip Hacks Server Management Entrepreneur Scary Stories Private Cloud Username Managing Costs Amazon Black Friday SSID Superfish Identity Theft Fun eCommerce Twitter Database Surveillance Virtual Assistant Outsource IT Deep Learning Undo Error IT Technicians Virtual Machine Environment Media Cookies Cyber Monday Medical IT Education Proxy Server Reviews Social Engineering Remote Computing Tactics Development Hotspot Transportation Small Businesses Mobile Computing Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Tablet Shopping Search Best Practice Alert Addiction Language Employer/Employee Relationships Outsourcing Application Navigation Managed IT Buisness File Sharing Management PCI DSS Dark Data Chatbots How To Screen Reader Distributed Denial of Service Workplace IBM Legal IT solutions Gig Economy Business Growth Notifications Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Travel Regulations Compliance Identity Cortana Smart Tech Memes Co-managed IT Techology Google Maps Bookmark Alt Codes Download Net Neutrality Alerts SQL Server Technology Care Business Communications Competition Downtime Unified Threat Management Financial Data History Connectivity IT Break Fix Scams Unified Threat Management Hosted Solution Browsers Smartwatch Typing Upload Procurement Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Network Congestion Cyber security Knowledge IoT Communitications Dark Web Cables Google Drive User Error User CES Trends Supply Chain Management Google Calendar Term Google Apps Point of Sale Customer Resource management FinTech 5G Regulations Experience Star Wars IT Assessment Microsoft Excel IT Maintenance IP Address Google Docs Unified Communications Data Analysis Bitcoin Network Management Running Cable Tech Support Gamification Flexibility Staff Value Business Intelligence Legislation Shortcuts Google Wallet Organization Monitors Social Networking Smart Devices Ransmoware Recovery Fileless Malware Digital Security Cameras Hard Drives Windows 8 Laptop Websites Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Domains Drones Health IT Motherboard Data Breach Electronic Medical Records Assessment Electronic Health Records Permissions Workforce SharePoint Directions Videos Refrigeration Halloween Wasting Time Threats

Blog Archive