Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers Targeting Amazon Users

Scammers Targeting Amazon Users

It’s the holiday season, and with it comes a multitude of hackers trying to cash in on everyone’s online purchases. These phishing scams always increase when the holiday season comes around, so it’s best to stay vigilant so that you don’t give yourself the gift of sadness this year. One such threat is already here, and it’s voice spoofing of Amazon orders.

In this case, an email scam is circulating which encourages users to call a number listed to confirm an order, usually one with a large price. This nasty trick is intended to harvest phone numbers and credit card numbers for later exploitation. Security researchers Avanan have found that the contact number listed on the email is not Amazon; it is instead a scammer who records the phone number with Caller ID. Afterwards, the user will be contacted by the scammer, who requests that the user provide financial information in order to cancel the order.

We think enough people are familiar with Amazon now to determine that there are several red flags with this scenario. First of all, you know how to cancel an Amazon order; just log into your account and do it from there. Second, if you placed an order with Amazon, why would you have to reconfirm your financial information when it is already on file? It just doesn’t make sense, and that’s the point we are trying to make. A lot of these issues can be resolved simply by slowing down, taking a step back, and not rushing to conclusions or to resolve a problem that does not exist.

Scams involving online retailers are nothing new, but this particular scam is notable because the emails that get sent out are able to make it past spam blockers and content filters. It does this by including legitimate links within the body of the email, meaning that your email solution doesn’t necessarily flag it immediately.

We offer the following advice to you:

  • Don’t call numbers you don’t recognize.
  • Don’t click on suspicious links in your email inbox.
  • Don’t give out your personal information or credit card information just because someone on the phone told you to.
  • Check the sender for any message you feel is suspicious to ensure it is legitimate.
  • Check your account before responding to any correspondence from the sender.
  • Set up multi-factor authentication, just in case.

Stay safe this holiday season with Voyage Technology. We can help your business stay secure through advanced industry-standard security solutions designed to protect your organization. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 16 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Training Compliance Covid-19 Gadgets Cloud Computing Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To BDR HIPAA Computing 2FA Risk Management Virtual Private Network Computers Health Help Desk Analytics Website Office Tips Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Operating System Router Physical Security Customer Service Display Printer Excel Paperless Office Infrastructure Monitoring Remote Workers Document Management Managed IT Service Free Resource Firewall Telephone Project Management Scam Windows 7 Data loss Microsoft 365 The Internet of Things Cooperation Solutions Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Windows 11 Data Storage Cryptocurrency Modem Supply Chain Hacking User Tip Processor Video Conferencing Presentation Computer Repair Mobile Security Managed Services Provider Virtual Machines Virtual Desktop Professional Services Data storage LiFi Wireless Technology Smart Technology Outlook Machine Learning Money Saving Time iPhone Humor Word Vulnerabilities Maintenance Data Privacy Sports Downloads Antivirus Mouse Images 101 Licensing Mobility Multi-Factor Authentication Safety Entertainment Administration Robot Employees Telephone System Cost Management Integration Settings Wireless Printing Content Filtering IT Management Customer Relationship Management YouTube Meetings VPN Holidays Username Hypervisor Displays Point of Sale PowerPoint 5G Black Friday Shopping Optimization Google Docs Unified Communications Database Employer/Employee Relationships Outsourcing Experience User PCI DSS Bitcoin Network Management Running Cable Tech Support IT Technicians Navigation Cookies Workplace Monitors Cyber Monday Gig Economy Google Wallet Proxy Server Internet Service Provider Tactics Teamwork Hiring/Firing Hotspot Evernote Paperless Regulations Compliance Windows 8 IP Address Laptop Websites Mirgation Memes Nanotechnology Co-managed IT Drones SharePoint Net Neutrality Addiction SQL Server Technology Care Electronic Medical Records Language Business Communications Recovery Financial Data Management History Halloween Chatbots Lenovo IT Screen Reader Scams Hard Drives Writing Distributed Denial of Service Smartwatch Procurement Service Level Agreement Azure Hybrid Work Domains Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Tech Human Resources Telework Hacks Server Management Cyber security Superfish Bookmark Communitications Identity Theft Smart Tech Cables Refrigeration Fun CES Supply Chain Management Deep Learning Download Public Speaking Twitter Alerts Error Term Google Apps FinTech Lithium-ion battery Browsers IT Assessment Education Connectivity IT Maintenance Social Engineering Break Fix Entrepreneur Flexibility Upload Value Business Intelligence Remote Computing Shortcuts Multi-Factor Security Organization Mobile Computing Social Network Smart Devices Tablet IoT Ransmoware Undo Search Dark Web Digital Security Cameras Remote Working Best Practice Trends Memory Vendors Alert Buisness File Sharing Regulations Google Play Be Proactive Dark Data Google Calendar Managed IT Customer Resource management Data Breach Legal Data Analysis Electronic Health Records IT solutions Star Wars Workforce How To Microsoft Excel Videos Business Growth Gamification Wasting Time Threats Notifications Staff Travel Social Networking Security Cameras Workplace Strategies Application Legislation Trend Micro Techology Fileless Malware Software as a Service Google Maps Meta Cortana Alt Codes Content Managing Costs Amazon IBM Wearable Technology Downtime Unified Threat Management Motherboard SSID Comparison Health IT eCommerce Unified Threat Management Directions Surveillance Hosted Solution Assessment Virtual Assistant Outsource IT Permissions Typing Virtual Machine Environment Media Medical IT Network Congestion Specifications Reviews Google Drive User Error Microchip Development Internet Exlporer Transportation Small Businesses Competition Knowledge Fraud

Blog Archive