Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers Targeting Amazon Users

Scammers Targeting Amazon Users

It’s the holiday season, and with it comes a multitude of hackers trying to cash in on everyone’s online purchases. These phishing scams always increase when the holiday season comes around, so it’s best to stay vigilant so that you don’t give yourself the gift of sadness this year. One such threat is already here, and it’s voice spoofing of Amazon orders.

In this case, an email scam is circulating which encourages users to call a number listed to confirm an order, usually one with a large price. This nasty trick is intended to harvest phone numbers and credit card numbers for later exploitation. Security researchers Avanan have found that the contact number listed on the email is not Amazon; it is instead a scammer who records the phone number with Caller ID. Afterwards, the user will be contacted by the scammer, who requests that the user provide financial information in order to cancel the order.

We think enough people are familiar with Amazon now to determine that there are several red flags with this scenario. First of all, you know how to cancel an Amazon order; just log into your account and do it from there. Second, if you placed an order with Amazon, why would you have to reconfirm your financial information when it is already on file? It just doesn’t make sense, and that’s the point we are trying to make. A lot of these issues can be resolved simply by slowing down, taking a step back, and not rushing to conclusions or to resolve a problem that does not exist.

Scams involving online retailers are nothing new, but this particular scam is notable because the emails that get sent out are able to make it past spam blockers and content filters. It does this by including legitimate links within the body of the email, meaning that your email solution doesn’t necessarily flag it immediately.

We offer the following advice to you:

  • Don’t call numbers you don’t recognize.
  • Don’t click on suspicious links in your email inbox.
  • Don’t give out your personal information or credit card information just because someone on the phone told you to.
  • Check the sender for any message you feel is suspicious to ensure it is legitimate.
  • Check your account before responding to any correspondence from the sender.
  • Set up multi-factor authentication, just in case.

Stay safe this holiday season with Voyage Technology. We can help your business stay secure through advanced industry-standard security solutions designed to protect your organization. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Data Backup Smartphone AI Android Data Recovery Disaster Recovery Upgrade Business Management Smartphones VoIP Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Automation Miscellaneous Artificial Intelligence Information Holiday Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Blockchain Bandwidth Windows 10 Wi-Fi Two-factor Authentication Apps Vendor Data Security Mobile Office WiFi Tip of the week Employer-Employee Relationship Chrome Budget Networking Apple App Mobile Device Management BYOD Gmail Managed Services Voice over Internet Protocol Access Control Office 365 Hacker HIPAA How To Avoiding Downtime Applications BDR Marketing Computing Conferencing Information Technology Healthcare Health Big Data Analytics Office Tips Augmented Reality 2FA Retail Storage Password Computers Managed IT Services Bring Your Own Device Router Website Help Desk Operating System Virtual Private Network Risk Management The Internet of Things Paperless Office Infrastructure Telephone Social Windows 11 Cooperation Free Resource Document Management Project Management Windows 7 Excel Microsoft 365 Customer Service Scam Data loss Solutions Patch Management Save Money Remote Monitoring Going Green Vulnerability End of Support Vendor Management Monitoring Firewall Physical Security Cybercrime Display Printer Remote Workers Downloads iPhone Virtual Desktop LiFi Licensing Data storage Vulnerabilities Machine Learning Entertainment Outlook Money Images 101 Customer Relationship Management Supply Chain Humor Maintenance Mobility Telephone System Multi-Factor Authentication Cost Management Antivirus Hacking Sports Mouse Presentation Employees Administration Integration Wireless Technology Modem User Tip Processor Mobile Security Robot Holidays Data Privacy Word Settings Data Storage Wireless IT Management Smart Technology Printing Content Filtering Video Conferencing VPN Meetings Managed Services Provider Virtual Machines Professional Services YouTube Saving Time Safety Computer Repair Cryptocurrency Managed IT Service Monitors Unified Communications Experience Download Net Neutrality Workplace Strategies Alerts SQL Server Google Docs Bitcoin Running Cable Financial Data Meta History Connectivity IT Break Fix Websites Google Wallet Browsers Smartwatch Amazon Upload Procurement Azure Multi-Factor Security Tech Electronic Medical Records Windows 8 Application Laptop Social Network Telework Outsource IT SharePoint Cyber security IoT Communitications Media Dark Web Drones CES Environment IBM Writing Trends Supply Chain Management Lenovo Google Calendar Term Virtual Reality Halloween Customer Resource management FinTech Small Businesses Regulations Star Wars IT Assessment Server Management Microsoft Excel Private Cloud Data Analysis Displays Gamification Flexibility Superfish Staff Value Identity Theft Legislation Twitter Hacks Scary Stories Organization Outsourcing Social Networking Fun Smart Devices Error Competition Fileless Malware Digital Security Cameras Social Engineering Deep Learning Content Remote Working Workplace Wearable Technology Memory Comparison Google Play Remote Computing Health IT Hiring/Firing Motherboard Data Breach Assessment Electronic Health Records Paperless Permissions Education Directions Videos User Co-managed IT Wasting Time Tablet Specifications Security Cameras Alert Mobile Computing Technology Care Trend Micro Microchip Search Internet Exlporer Software as a Service Business Communications Managed IT Fraud File Sharing Dark Data IP Address How To Best Practice Username Scams Managing Costs eCommerce Black Friday SSID Notifications Buisness Hybrid Work IT solutions Database Surveillance Human Resources Virtual Assistant Travel Legal Business Growth Recovery Cables Techology IT Technicians Virtual Machine Google Maps Cookies Cyber Monday Medical IT Hard Drives Proxy Server Reviews Cortana Tactics Development Google Apps Hotspot Transportation Unified Threat Management Domains Alt Codes IT Maintenance Unified Threat Management Mirgation Hypervisor Nanotechnology Optimization PowerPoint Refrigeration Downtime Shopping Business Intelligence Network Congestion Hosted Solution Addiction Shortcuts Language Employer/Employee Relationships Public Speaking Navigation Lithium-ion battery Typing Management PCI DSS Ransmoware User Error Chatbots Screen Reader Distributed Denial of Service Gig Economy Vendors Entrepreneur Knowledge Service Level Agreement Internet Service Provider Be Proactive Computing Infrastructure Teamwork Point of Sale Google Drive Evernote Regulations Compliance Workforce Identity 5G Smart Tech Memes Network Management Tech Support Undo Bookmark Threats

Blog Archive