x

Like our Facebook Page

   
Early Times Newspaper Jammu, Leading Newspaper Jammu
 
Breaking News :   Rs 500 crore needed to become Cong’s CM face, alleges Sidhu’s wife | Connectivity, coordination ensured historic success: Defence Minister | Singh dedicates BRO’s 22 vital infrastructure projects for J&K | Fight against Chitta: Rare political unity in Himachal sends message to J&K | Srinagar Police seize Rs 1 crore property of notorious drug peddler | 25 killed, 6 injured in fire at nightclub in Goa | Deeply saddened: LG Sinha | LG Sinha extends gratitude to soldiers, urges people to donate generously | JKPSC conducts CCE as per schedule | CBK files chargesheet, 2 booked | Parliamentary Panel to summon airline executives, regulator | PM Modi to initiate debate on Vande Mataram in Lok Sabha today | Cross-border arms smuggling module busted in Punjab | MeT predicts light snowfall | Forest fire triggers landmine blasts | MLA Ramgarh kick-starts lane & drain Development work at village Dabuj Kaka | Three of family killed as car overturns in Karnataka’s Mandya | Kendriya Vidyalaya Samba celebrated its Annual Sports Day with great zeal, enthusiasm | Natrang stages play Topian | CM Yogi Adityanath government intensifies crackdown on illegal liquor networks to safeguard public safety | JNV Budgam hosts Grand ‘Alumni Meet 2025’ | Under Chief Minister Yogi Adityanath’s leadership, Uttar Pradesh has emerged as the new powerhouse of Startup India | Armed Forces Flag Day: Div Com Kashmir pays homage to Armed forces | Uttarakhand: Interstate arms trafficker held with 5 guns, 40 cartridges | Self-employment is creating most new jobs in India: What this means for job seekers in the years to come | Manipulation in Campus Placements: IITs Ignite a needed ethical revolution | INDIA Bloc On Crossroads | Back Issues  
 
news details
Voice Phishing
11/6/2024 11:04:35 PM
In an era of rapid digital transformation, cybersecurity threats have become more sophisticated, and “vishing” — or voice phishing — has emerged as a dangerous tactic to exploit human trust.
The National Informatics Centre (NIC) recently issued a crucial advisory urging government officials to exercise caution when receiving phone calls, emphasizing that caller ID information alone should not be trusted.
This cautionary message comes in response to a concerning increase in vishing attacks, where cybercriminals impersonate trusted entities to extract sensitive information or gain unauthorized access to official systems.
Vishing scams are often difficult to detect because they prey on human tendencies to trust caller ID displays and authoritative figures. Attackers, often skilled in social engineering, may pose as senior officials, law enforcement officers, or tech support personnel, using their fabricated identities to manipulate the target into revealing confidential data. Through these impersonation tactics, vishers gain access to sensitive information that can compromise entire systems, which, in the case of government officials, could lead to severe consequences for national security, data privacy, and the integrity of government operations.
The advisory from NIC highlights a fundamental vulnerability in modern communication — the inherent trust placed in caller ID systems. Many users, especially those in high-stakes environments like government agencies, often assume that caller ID is a reliable indicator of a caller’s identity. However, advancements in technology have made it alarmingly easy for attackers to spoof numbers, making a call appear as if it’s coming from a legitimate source. This spoofing technology enables attackers to masquerade as internal officials, increasing the likelihood that the target will lower their guard and share confidential information or grant access to restricted systems.
For government officials, vigilance is critical. The NIC’s advisory recommends several measures to counteract the rising threat of vishing.
First and foremost, officials are advised not to disclose sensitive information over the phone, especially when the caller claims to be from an authority figure or trusted organization. Instead, they should verify the caller’s identity through alternative channels, such as contacting the organization directly using publicly available numbers. Additionally, departments should consider conducting regular training sessions on cybersecurity awareness, ensuring that officials can recognize and respond appropriately to suspicious calls.
The advisory also stresses the importance of a “zero-trust” approach to communication, which essentially requires that officials assume no call is trustworthy by default. This mindset shift could be instrumental in protecting government systems from unauthorized access. Implementing stricter verification protocols, such as two-factor authentication and encryption, can further safeguard sensitive information. By encouraging officials to verify caller identities through independent methods, the NIC is reinforcing the importance of skepticism as a frontline defense against cyber threats.
  Share This News with Your Friends on Social Network  
  Comment on this Story  
 
 
 
Early Times Android App
STOCK UPDATE
 
 
 
 
 
 
 
   
Home About Us Top Stories Local News National News Sports News Opinion Editorial ET Cetra Advertise with Us ET E-paper
 
 
J&K RELATED WEBSITES
J&K Govt. Official website
Jammu Kashmir Tourism
JKTDC
Mata Vaishnodevi Shrine Board
Shri Amarnath Ji Shrine Board
Shri Shiv Khori Shrine Board
UTILITY
Train Enquiry
IRCTC
Matavaishnodevi
BSNL
Jammu Kashmir Bank
State Bank of India
PUBLIC INTEREST
Passport Department
Income Tax Department
JK CAMPA
JK GAD
IT Education
Web Site Design Services
EDUCATION
Jammu University
Jammu University Results
JKBOSE
Kashmir University
IGNOU Jammu Center
SMVDU