top of page

Understanding Vishing: A Comprehensive Study Of The Emerging Cybercrime




Raman Goyal, BBA LLB [H], Amity University, Noida


ABSTRACT:


This research paper explores the phenomenon of vishing, a specific type of cybercrime that leverages voice communication technology to deceive victims. Vishing, a portmanteau of "voice" and "phishing," involves criminals using telephony to trick individuals into divulging personal, financial, or confidential information. This paper delves into the various categories of vishing, examines notable examples, analyses the consequences for both individuals and organizations and discusses potential measures to combat this growing threat.


1. Introduction


In the digital age, cybercriminals continuously evolve their tactics to exploit technological vulnerabilities. Vishing has emerged as a prominent threat, targeting unsuspecting individuals through voice communication channels. This section introduces vishing, its origins, and its relevance in the broader context of cybercrime.


2. Definition and Mechanisms of Vishing


Vishing is a type of social engineering attack where fraudsters use voice communication to impersonate trusted entities, such as banks, government agencies, or reputable companies. Unlike traditional phishing, which relies on emails or fake websites, vishing capitalizes on the personal nature of voice calls to manipulate victims into revealing sensitive information.


2.1 Mechanisms of Vishing


Caller ID Spoofing: Criminals use technology to manipulate caller IDs, making it appear as though the call is coming from a legitimate source.

Indian Journal of Law and Legal Research

Abbreviation: IJLLR

ISSN: 2582-8878

Website: www.ijllr.com

Accessibility: Open Access

License: Creative Commons 4.0

Submit Manuscript: Click here

Licensing: 

 

All research articles published in The Indian Journal of Law and Legal Research are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

 

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the IJLLR or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the IJLLR.

bottom of page