Out of the Box Solutions Blog

Sick of Spam Calls? VoIP is Partly to Blame

Sick of Spam Calls? VoIP is Partly to Blame

If you have access to a phone, chances are you’ve received a spammy robocall. In fact, you’ve probably received a bunch… but why? And how are these robocalls able to hide behind what looks to be a local number? Unfortunately, it’s because the scammers behind these robocalls are using a helpful business tool… Voice-over-Internet-Protocol telephony, also known as VoIP.

How Spam Callers Are Leveraging VoIP

While VoIP makes an excellent telephony solution for businesses, phone scammers can use it to their own advantage. As VoIP leverages the Internet to place calls, it has become remarkably easy for scammers to work around the call blocks that used to be an effective means of stopping them.

This is because VoIP allows cybercriminals to imitate any number they want, through a process known as spoofing. The scariest part is how there is nothing to stop these spoofed calls in the current telephone infrastructure. Well, maybe that isn’t the scariest part.

It may be a little more scary to think about how scammers and hackers can spoof a number from your neighborhood, increasing the likelihood that you’ll answer. You can even receive a spoofed call from your own number.

Common Scams, and Frequently Targeted Areas

Of course, this doesn’t mean that a VoIP scammer will necessarily call you. Sure, some will - one common scam involves a scammer calling your hotel room posing at the front desk to confirm your credit card details. More frequently, these scammers will leverage automation to assist with their scams. Hundreds of potential victims will be robocalled with a spoofed number, and only those who pick up will be interacted with.

Different areas around the world are targeted by these scams more often. The top ten countries for phone spam break down as follows, based on the percentage of all calls that are spam.

  1. Spain, with 24 percent.
  2. The United Kingdom, with 22 percent.
  3. Italy, with 21 percent.
  4. France, with 20 percent.
  5. Argentina, with 10 percent.
  6. The United States, with 10 percent.
  7. Mexico, with 9 percent.
  8. Brazil, with 9 percent.
  9. Chile, with 9 percent.
  10. Australia, with 6 percent.

This is considering that, in the United States, there was a 46 percent increase in robocall spam in 2018. For whatever reason, within the United States, seven of the top ten targeted areas are in Texas, including Austin, Dallas, and Houston.

Can These Calls Be Stopped?

With any luck, yes. Google has begun to implement a preventative process utilizing its Google Assistant. When a call is received, the Assistant answers, asks for the reason of the call, and provides a transcript of the response so the recipient of the call knows whether or not to answer. This all happens on the device, keeping your calls private.

The FTC has also been commanded to put a stop to these calls, including approving another Google technology, STIR/SHAKEN (Secure Telephone Identity Revisited/Signature-based Handling of Asserted information using toKENs) which would authenticate calls by confirming the number is associated with the device making the call, and therefore is presumably from the owner of the phone number.

How often do you receive these kinds of calls? How happy would you be if they were stopped? Tell us what you think in the comments!

Looking for Value? Look No Further
Tip of the Week: Five of Android Pie’s Tastier Fea...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity Malware Efficiency User Tips Communication Data Privacy Hackers Tech Term Microsoft Mobile Device Internet Google Computer Smartphones Hardware IT Support Users Email Innovation Ransomware Windows 10 Managed IT Services Business Management Cybersecurity Small Business Android Communications Mobile Devices Workplace Tips Business Passwords Network Software Browser IT Services Cloud Outsourced IT Collaboration VoIp Information Applications Backup Wireless Saving Money Holiday Managed Service Social Media Apps Bandwidth Smartphone Cloud Computing Data Backup Managed IT services Hosted Solutions Employer-Employee Relationship Business Intelligence Miscellaneous Data recovery Internet of Things Wi-Fi Value Save Money Laptop Gmail Windows Blockchain Marketing Microsoft Office Upgrade Gadgets Networking Managed IT Service Chrome Tech Terms Connectivity Processor Company Culture Patch Management Healthcare Remote Computing Mobility Automation Facebook Office Cost Management Data Security Paperless Office Office 365 Compliance Artificial Intelligence Quick Tips Net Neutrality Voice over Internet Protocol Virtual Assistant Password Cortana Analytics Wireless Charging Telephony Remote Monitoring and Management G Suite Virtualization BDR RAM VPN Access Control Data Management Computers Medical IT Tablet Analysis Certification HIPAA Employees Authentication SSD A.I. BYOD Hybrid Cloud Conferencing Error instant Messaging Business Technology Antivirus Operating System IT budget SaaS Dongle Paper Document Management Windows Server 2008 R2 Telecommute Troubleshooting Health Excel Physical Security Maintenance Hard Drive Solid State Drive Authorization Chrome OS Movies Plug-In Wireless Internet Cables Lead Generation Network Attached Storage Vulnerabilities Technology Tips Display Staff Managing Stress Battery GDPR Ink Telecommuting Taskbar Update Knowledge eCommerce Training Router Tip of the week Processors Hard Disk Drive Twitter Proactive IT Help Desk Database Content Filtering Touchscreen Cryptocurrency Streaming Media Phishing Benchmarks Environment Comparison Personal Information Government PowerPoint Digital National Security Data loss Outlook Online Shopping Security Cameras Websites Internet Explorer User Tip Vulnerability Video Machine Learning Human Resources Inventory Unified Communications Data Breach Risk Management Business Continuity Cybercrime Microsoft Office 365 Windows 7 Backup and Disaster Recovery Downloads e-waste Specifications IT Management Storage E-Commerce Sports Workers Spam Profitability Voice over IP Reporting Word Safety Threat Spyware Customer Service Employee-Employer Relationship Data Protection Sales Big Data Tactics WannaCry Server Management Time Management Hard Drives Trends Eliminating Downtime disposal Bring Your Own Device Server Dark Web Payment Millennials Edge Updates Virus Amazon Mobile Security Microsoft Teams Settings Wearables Printing HP OneNote Electronic Health Records Alert Regulation Disaster Recovery Financial Printers