Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

VoIP Has a Spam Problem

VoIP Has a Spam Problem

Robocalls plague the world’s smartphone users, but have you ever stopped to ask why you receive them in the first place? Why are robocallers able to hide behind a local number so that you pick up the phone? Scammers are actually using a business tool you may have heard of… Voice over Internet Protocol, or VoIP, a modern phone solution that in the hands of anyone else is extremely helpful.

How Spam Callers Are Leveraging VoIP

VoIP is great for businesses, but scammers can use it to cause mischief in its own right. Since VoIP uses the Internet to place calls, scammers can work around the call blocks that used to be a way to block their attacks in the past.

VoIP gives cybercriminals the ability to imitate just about any number out there with a process called spoofing. One of the scariest parts about this is that spoofed calls cannot be stopped by the current telephone infrastructure, but it actually gets worse. Since hackers and criminals can spoof a number from your neighborhood, it’s more likely that you’ll answer. They can even spoof your own number, shockingly enough.

Common Scams and Frequently Targeted Areas

This doesn’t mean that a VoIP scammer will call you--all we’re trying to say is that it’s more accessible than it’s ever been before. Some of the more common scams involve a scammer calling a hotel room posing as the front desk to confirm credit card details. It’s much easier and more efficient for a scammer to pull off attacks through the use of automation. Hundreds of potential victims can be robocalled with a spoofed number, with only the ones who pick up the phone being interacted with.

Different areas of the world experience more trouble with spam attacks. The top ten countries for phone spam break down as follows:

  1. Spain, with 24 percent.
  2. The United Kingdom, with 22 percent.
  3. Italy, with 21 percent.
  4. France, with 20 percent.
  5. Argentina, with 10 percent.
  6. The United States, with 10 percent.
  7. Mexico, with 9 percent.
  8. Brazil, with 9 percent.
  9. Chile, with 9 percent.
  10. Australia, with 6 percent.

Furthermore, the United States saw a 46 percent increase in robocall spam in 2018. Among all locations within the U.S., the top ten targeted areas are in Texas, including Austin, Dallas, and Houston.

Can These Calls Be Stopped?

Google has begun the first steps to implement a preventative process utilizing its Google Assistant. When a call is received, the Assistant answers, asks for the reason for the call, and provides a transcript of the response. The recipient then knows whether or not the call is legitimate. This happens on the device, thus keeping your calls private.

The FTC has been given the task of stopping these calls, and steps have been taken to approving another Google technology, STIR/SHAKEN (Secure Telephone Identity Revisited/Signature-based Handling of Asserted information using toKENs), which can potentially authenticate calls by confirming the number is associated with the device making the call.

How often do you receive spoofed calls? What would you do to make them stop? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Internet Hardware Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Cybersecurity Microsoft Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Android Business Management VoIP Smartphones Mobile Devices communications Managed Service Upgrade Disaster Recovery Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Tech Term Remote Network Internet of Things Current Events Productivity Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Gadgets Server Managed Service Provider AI Remote Work Miscellaneous Information Holiday Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Compliance Government Training Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Two-factor Authentication Mobile Office Data Security Apps Managed Services Voice over Internet Protocol BYOD Vendor Mobile Device Management Chrome Gmail Budget Apple Networking App Employer-Employee Relationship Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 IT Support Tip of the week Conferencing WiFi How To BDR Operating System HIPAA Computers Router Healthcare Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Remote Workers Cybercrime Physical Security Display Printer Paperless Office Free Resource Infrastructure Project Management Windows 7 Monitoring Microsoft 365 Firewall Document Management Solutions Telephone The Internet of Things Scam Data loss Windows 11 Social Cooperation 2FA Going Green Patch Management Save Money Excel Professional Services Virtual Machines Settings Wireless Printing Content Filtering Hacking IT Management VPN YouTube Meetings Presentation iPhone Cryptocurrency Wireless Technology User Tip Modem Processor Computer Repair Mobile Security Vulnerabilities Virtual Desktop Data Privacy Data storage LiFi Images 101 Word Smart Technology Mobility Outlook Multi-Factor Authentication Machine Learning Money Saving Time Humor Managed IT Service Safety Employees Maintenance Sports Integration Downloads Antivirus Mouse Licensing Entertainment Administration Holidays Data Storage Supply Chain Video Conferencing Robot Telephone System Customer Relationship Management Cost Management Managed Services Provider Workplace Gig Economy Alt Codes Content Wearable Technology Internet Service Provider Downtime Unified Threat Management Motherboard Teamwork Hiring/Firing Comparison Competition Health IT Unified Threat Management Directions Regulations Compliance Hosted Solution Assessment Permissions Evernote Paperless Co-managed IT Typing Memes Net Neutrality SQL Server Technology Care Network Congestion Specifications Google Drive User Error Microchip Financial Data User Internet Exlporer History Knowledge Fraud Business Communications Scams Smartwatch Username IT Procurement Point of Sale Azure Hybrid Work 5G Black Friday IP Address Google Docs Telework Unified Communications Database Cyber security Experience Tech Human Resources Running Cable Tech Support IT Technicians Cables CES Bitcoin Network Management Communitications Google Wallet Proxy Server Supply Chain Management Cookies Monitors Cyber Monday FinTech Recovery Tactics Hotspot Term Google Apps IT Assessment Laptop Websites Mirgation IT Maintenance Hard Drives Windows 8 Domains Drones Flexibility Nanotechnology Value Business Intelligence Shortcuts SharePoint Organization Addiction Electronic Medical Records Language Smart Devices Halloween Chatbots Ransmoware Digital Security Cameras Refrigeration Management Public Speaking Lenovo Remote Working Screen Reader Memory Vendors Writing Distributed Denial of Service Google Play Be Proactive Lithium-ion battery Service Level Agreement Data Breach Virtual Reality Computing Infrastructure Electronic Health Records Entrepreneur Scary Stories Private Cloud Identity Workforce Videos Hacks Server Management Superfish Bookmark Identity Theft Smart Tech Wasting Time Threats Fun Security Cameras Workplace Strategies Deep Learning Download Trend Micro Twitter Alerts Software as a Service Error Meta Undo Browsers Education Connectivity Managing Costs Amazon Social Engineering Break Fix SSID Upload eCommerce Remote Computing Surveillance Virtual Assistant Outsource IT Multi-Factor Security Mobile Computing Social Network Tablet IoT Virtual Machine Environment Search Dark Web Media Medical IT Reviews Application Best Practice Trends Alert Development Buisness File Sharing Regulations Transportation Small Businesses Dark Data Google Calendar Managed IT Customer Resource management IBM Legal Data Analysis IT solutions Star Wars Hypervisor Displays How To Microsoft Excel PowerPoint Shopping Business Growth Gamification Optimization Notifications Staff Travel Social Networking Employer/Employee Relationships Outsourcing Legislation Techology Fileless Malware PCI DSS Google Maps Cortana Navigation

Blog Archive