“Vishing” can pose a threat

What is “Vishing”?

“Vishing” uses techniques that are essentially similar to phishing, the act of acquiring sensitive information via electronic communication while posing as a trusted entity. A vishing attack takes place over the telephone, using call spoofing, and tricks a user into disclosing personal information such as credit card numbers or a three digit security code.

Recent vishing attacks use an automated robo-caller stating that the victim’s security software was breached and requests them to call a number. Calling the number will connect the victim to a human who will attempt to access the victim’s workstation via Citrix remote access. Once they have access to your computer, they can do the following: Continue reading

A manager hired to help developmentally disabled people misappropriates more than $58,000

fraud2(Audit report published Aug. 11) The Department of Social and Health Services (DSHS) oversees supported living agencies, which provide services to individuals with developmental disabilities. A house manager runs the daily operations of the supported living home such as purchasing food, completing payroll, and paying bills. Continue reading