Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers Targeting Amazon Users

Scammers Targeting Amazon Users

It’s the holiday season, and with it comes a multitude of hackers trying to cash in on everyone’s online purchases. These phishing scams always increase when the holiday season comes around, so it’s best to stay vigilant so that you don’t give yourself the gift of sadness this year. One such threat is already here, and it’s voice spoofing of Amazon orders.

In this case, an email scam is circulating which encourages users to call a number listed to confirm an order, usually one with a large price. This nasty trick is intended to harvest phone numbers and credit card numbers for later exploitation. Security researchers Avanan have found that the contact number listed on the email is not Amazon; it is instead a scammer who records the phone number with Caller ID. Afterwards, the user will be contacted by the scammer, who requests that the user provide financial information in order to cancel the order.

We think enough people are familiar with Amazon now to determine that there are several red flags with this scenario. First of all, you know how to cancel an Amazon order; just log into your account and do it from there. Second, if you placed an order with Amazon, why would you have to reconfirm your financial information when it is already on file? It just doesn’t make sense, and that’s the point we are trying to make. A lot of these issues can be resolved simply by slowing down, taking a step back, and not rushing to conclusions or to resolve a problem that does not exist.

Scams involving online retailers are nothing new, but this particular scam is notable because the emails that get sent out are able to make it past spam blockers and content filters. It does this by including legitimate links within the body of the email, meaning that your email solution doesn’t necessarily flag it immediately.

We offer the following advice to you:

  • Don’t call numbers you don’t recognize.
  • Don’t click on suspicious links in your email inbox.
  • Don’t give out your personal information or credit card information just because someone on the phone told you to.
  • Check the sender for any message you feel is suspicious to ensure it is legitimate.
  • Check your account before responding to any correspondence from the sender.
  • Set up multi-factor authentication, just in case.

Stay safe this holiday season with Voyage Technology. We can help your business stay secure through advanced industry-standard security solutions designed to protect your organization. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money Business Management Smartphones VoIP Android Upgrade Managed Service Mobile Devices communications Disaster Recovery Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Tech Term Network Remote Internet of Things Current Events Artificial Intelligence Facebook Productivity Automation Gadgets Cloud Computing Covid-19 Miscellaneous AI Server Remote Work Managed Service Provider Outsourced IT Holiday Information Employee/Employer Relationship Spam Encryption Compliance Office Windows 10 Data Management Business Continuity Government Training Windows 10 Bandwidth Virtualization Blockchain Business Technology Wi-Fi Two-factor Authentication Data Security Apps Mobile Office Mobile Device Management Gmail Networking Chrome Budget Managed Services Voice over Internet Protocol Apple BYOD Employer-Employee Relationship App Vendor Office 365 IT Support How To BDR WiFi Conferencing Access Control Hacker Computing Avoiding Downtime Tip of the week Marketing Information Technology Applications Office Tips Analytics Managed IT Services Help Desk Augmented Reality Storage Password Big Data Bring Your Own Device Healthcare Virtual Private Network Computers Health Operating System HIPAA Website Router Risk Management Retail Firewall Scam Data loss Monitoring The Internet of Things Patch Management Save Money Remote Workers Social Remote Monitoring End of Support Telephone Vulnerability Vendor Management Physical Security Cooperation Free Resource Display Project Management Printer Windows 7 Going Green Customer Service Paperless Office Microsoft 365 Infrastructure Cybercrime Windows 11 Solutions 2FA Document Management Excel Mobile Security Maintenance Virtual Desktop Processor Data storage Antivirus LiFi Holidays Data Storage Outlook Smart Technology Video Conferencing Money Safety Managed Services Provider Humor Professional Services Saving Time Virtual Machines Robot Data Privacy Managed IT Service Sports Mouse Downloads iPhone Licensing IT Management Administration Meetings VPN Vulnerabilities Customer Relationship Management Entertainment Computer Repair Images 101 Hacking Mobility Settings Presentation Telephone System Multi-Factor Authentication Cost Management Printing Wireless Content Filtering Wireless Technology YouTube Machine Learning Cryptocurrency Employees Supply Chain Integration User Tip Word Modem Database Surveillance Workplace Virtual Assistant Google Wallet Twitter Refrigeration Hiring/Firing IT Technicians Virtual Machine Error Paperless Cyber Monday Medical IT Windows 8 Laptop Public Speaking Social Engineering Proxy Server Reviews Cookies Tactics Development Co-managed IT Hotspot Transportation Drones Lithium-ion battery Remote Computing Entrepreneur Technology Care Mirgation Hypervisor Business Communications PowerPoint Tablet Halloween Shopping Nanotechnology Optimization Addiction Scams Language Employer/Employee Relationships Alert File Sharing Undo Dark Data Management PCI DSS Hybrid Work Chatbots Managed IT Navigation Human Resources Distributed Denial of Service Hacks Scary Stories How To Gig Economy Screen Reader Service Level Agreement Internet Service Provider Cables Computing Infrastructure Teamwork Notifications Fun Deep Learning Travel Regulations Compliance Identity Evernote Techology Google Apps Google Maps Bookmark Smart Tech Memes Application Download Net Neutrality IT Maintenance Alerts SQL Server Education Unified Threat Management Financial Data Business Intelligence History Unified Threat Management Shortcuts Break Fix Mobile Computing IBM Browsers Smartwatch Connectivity IT Search Upload Procurement Ransmoware Azure Best Practice Network Congestion Social Network Telework Vendors Cyber security Multi-Factor Security Tech User Error Be Proactive Dark Web Buisness CES IoT Communitications Trends Supply Chain Management Workforce Legal IT solutions Business Growth Point of Sale Competition Customer Resource management FinTech Threats Regulations Google Calendar Term Star Wars IT Assessment Workplace Strategies Microsoft Excel Data Analysis Cortana Gamification Flexibility Meta Staff Value Network Management Tech Support Legislation Alt Codes Monitors Organization Amazon Social Networking Smart Devices Downtime Fileless Malware Digital Security Cameras User Content Remote Working Outsource IT Wearable Technology Memory Hosted Solution Websites Media Comparison Google Play Typing Health IT Environment Motherboard Data Breach Assessment Electronic Health Records SharePoint Permissions IP Address Electronic Medical Records Directions Videos Knowledge Small Businesses Wasting Time Google Drive Specifications Security Cameras Writing Displays Trend Micro Lenovo Internet Exlporer Software as a Service Fraud Virtual Reality Microchip 5G Recovery Experience Hard Drives Username Outsourcing Managing Costs Google Docs Server Management Unified Communications Private Cloud Black Friday SSID Bitcoin Identity Theft Running Cable Domains eCommerce Superfish

Blog Archive