skip to main content
10.1145/1456625.1456635acmotherconferencesArticle/Chapter ViewBasic AbstractPublication PagesinfoseccdConference Proceedingsconference-collections
Several features on this page require Premium Access.
You are using the Basic Edition. Features requiring a subscription appear in grey.
research-article
Free access

Vishing

Published: 26 September 2008 Publication History

Abstract

This paper is intended to discuss an emerging threat vector which combines social engineering and technology. Utilizing Voice over Internet Protocol (VoIP) convenience combined with electronic mail phishing techniques, "Vishing" has the potential to be a highly successful threat vector. Vishing victims face identity theft and/or financial fraud. The goal of this paper is to illustrate how the attack can be carried out in order to increase information security awareness. The discussion will contain documentation from actual events (to display the threat as current), proof-of concept (to demonstrate ease of execution), and theoretical arguments (to discuss the possible future impact).

Formats available

You can view the full content in the following formats:

References

[1]
http://astersik.com
[2]
Unknown, 2008
[3]
http://www.trixbox.org/
[4]
http://www.skype.com/
[5]
http://www.sipura.com/products/spa1000.htm
[6]
http://www.voip-info.org/wiki/

Cited By

View all
  • (2025)Generation of Believable Fake Integral Equations for Cyber DeceptionSecurity and Privacy10.1007/978-3-031-90587-2_6(79-93)Online publication date: 23-May-2025
  • (2025)Ventinel: Automated Detection of Android Vishing Apps Using Optical Character RecognitionFuture Internet10.3390/fi1701002417:1(24)Online publication date: 7-Jan-2025
  • (2024)Theoretical and Experimental Framework for Estimating Cyber Victimization Risk in a Hybrid Physical-Virtual WorldJournal of Applied Security Research10.1080/19361610.2024.236896920:2(219-243)Online publication date: 17-Jun-2024
  • Show More Cited By

Recommendations

Comments