The enigma of the unsettling 'Unknown' spam calls.

Safeguarding your personal data from the increasing wave of phone frauds

The enigma of the unsettling 'Unknown' spam calls.
The enigma of the unsettling 'Unknown' spam calls.

Targeted phone scams are a growing concern among consumers, as scammers use increasingly sophisticated tactics to steal sensitive data. These scams involve callers who appear legitimate but are actually phishing for additional information to exploit.

An email from James in LA recounted his unsettling experience with a series of suspicious phone calls. His story underscores the importance of being vigilant in safeguarding our personal information. James shared the following details:

"In the past two months, I have received multiple random calls from unknown numbers, and each call begins with the caller identifying themselves as unknown and providing my full name. After confirming that they have the wrong person, they provide a birthdate and ask if it is mine. Despite this, they never reveal who they are representing. I can't help but feel paranoid about these calls."

Numerous individuals nationwide are encountering similar occurrences, wherein callers possess a limited amount of personal information and aim to validate or enlarge upon it. This technique, referred to as "social engineering," is a prevalent tactic employed by con artists to establish credibility and obtain significant information.

woman on phone
A woman talking on her cellphone. (Kurt "CyberGuy" Knutsson)

Where scammers get their information

The source of the eerie 'Unknown' spam calls is often a data breach or information leak. Scammers acquire fragmented information from multiple sources, such as public records, social media profiles, or purchased data from the dark web. They then use this incomplete data as a foundation for their phishing attempts, with the goal of completing their target's profile.

man on phone
A man talking on his cellphone. (Kurt "CyberGuy" Knutsson)

Understanding the scammer's playbook

Let's break down the tactics used in these calls:

The scammer may initially appear legitimate by providing accurate information, such as a full name and city. Nonetheless, they could be attempting to obtain additional information, such as your birthdate, to further their fraudulent activities.

The scammer is trying to obtain more valuable personal information by asking for confirmation of additional details such as a birthdate.

The caller does not reveal their identity or affiliation, making it challenging to confirm their authenticity and follow up if necessary.

The call's conclusion is meant to be swift and courteous, giving the recipient the impression that nothing out of the ordinary has transpired, thereby minimizing the chance of immediate suspicion or response.

The tactics are meticulously designed to manipulate human psychology. The initial accurate information establishes trust, the demand for confirmation appears reasonable, and the courteous departure concludes with a favorable final impression.

seated man with phone
A man talking on his cellphone. (Kurt "CyberGuy" Knutsson)

The dangers of information gathering

Unfortunately, there is a risk that scammers could use your birthdate to their advantage.

  • Build a more complete profile for identity theft
  • Access accounts or reset passwords
  • Impersonate you in other scams or fraudulent activities
  • Sell your information on the dark web

Every piece of personal information should be safeguarded with utmost care, as data is highly valuable in today's world.

woman speaking on phone
A woman talking on her cellphone. (Kurt "CyberGuy" Knutsson)

8 steps to protect your personal information

To safeguard your personal information from scammers' advanced techniques, consider implementing these protective measures.

1. Avoid sharing information with unknown callers

It is crucial to never reveal personal information to unknown callers over the phone. Always verify the caller's identity and avoid answering calls from unrecognized numbers. If you do answer, be cautious of callers who create a sense of urgency or use fear tactics to manipulate you.

man speaking on phone
A man talking on his cellphone. (Kurt "CyberGuy" Knutsson)

2. Verify caller identity

If you receive a suspicious call, request the caller's name, company, and a callback number. But, before calling back, do some research on the company. Find official contact information online and verify the call's legitimacy by contacting that number.

another woman speaking on a phone
A woman talking on her cellphone. (Kurt "CyberGuy" Knutsson)

3. Enable spam-blocking features

Consider using call blocking apps to screen calls and identify potential spam in addition to enabling spam-blocking features on your phone.

Updating your phone's operating system regularly will provide you with the latest security features and protections.

4. Report suspicious activity

If you receive suspicious calls, it is crucial to report them to your phone carrier and also file a complaint with the Federal Trade Commission (FTC). If you suspect fraud, it is advisable to report the incident to local law enforcement to safeguard yourself and others in your community.

woman in purple hat talking on phone
A woman talking on her cellphone. (Kurt "CyberGuy" Knutsson)

5. Remove your personal information from the internet

To protect your privacy, consider using a data removal service. While no service can guarantee complete removal of your data from the internet, a data removal service is a smart choice. They are not inexpensive, and your privacy is worth it. These services actively monitor and systematically erase your personal information from hundreds of websites.

The most effective way to erase your personal data from the internet is by limiting the information available, which reduces the risk of scammers cross-referencing data from breaches with information they might find on the dark web. This makes it harder for them to target you. To help you with data removal services, check out my top picks here. Additionally, make it a habit to regularly Google your name and phone number to see what information is publicly available about you.

6. Use an identity theft protection service

Identity theft companies can track your personal data, including your Social Security number, phone number, and email address, and notify you if it is being sold on the dark web or used to open accounts. Additionally, they can help you freeze your bank and credit card accounts to prevent further unauthorized use by criminals.

Some services offer identity theft insurance of up to $1 million to cover losses and legal fees, as well as a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. Check out my tips and best picks on how to protect yourself from identity theft.

7. Secure your accounts

To ensure the safety of your online accounts, it is recommended to employ strong and distinctive passwords for each one. Additionally, it is wise to steer clear of using easily predictable information, such as birthdates, in your passwords. A password manager can be utilized to generate and store intricate passwords. Furthermore, activating two-factor authentication on your devices can provide an additional layer of security.

8. Be cautious on social media

To safeguard your personal information on social media, review and adjust your privacy settings, be cautious about the information you share publicly, and avoid accepting friend requests or messages from unknown individuals.

To minimize the risk of falling prey to phone scams and identity theft, it is crucial to follow these comprehensive steps. Protecting your personal information is an ongoing process that requires constant vigilance and regular attention.

Kurt's key takeaways

To stay ahead of scammers, we must constantly adapt our tactics and be proactively defensive with our personal data. James' experience is a reminder of the importance of being cautious and staying vigilant.

Be cautious about sharing personal information online as it can be used by scammers.

By following the steps we've discussed, such as being cautious during phone calls and utilizing data removal and identity protection services, you not only safeguard yourself but also hinder scammers' ability to operate, potentially shielding others from becoming victims.

Can you share your most unusual or clever scam attempt and how you handled it? Your experiences could help others recognize and avoid similar scams in the future. Please write to us at Cyberguy.com/Contact.

To receive my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter at Cyberguy.com/Newsletter.

Let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

by Kurt Knutsson, CyberGuy Report

tech

A revolutionary device may enable you to identify microplastics in your beverages.

A revolutionary device may enable you to identify microplastics in your beverages.

tech
Become a proficient user of Google Workspace and Microsoft Office.

Become a proficient user of Google Workspace and Microsoft Office.

tech
Nearly 300,000 customers' information was exposed in the Avis Rent A Car cyberattack.

Nearly 300,000 customers' information was exposed in the Avis Rent A Car cyberattack.

tech
Human window washers on skyscrapers are being replaced by robots.

Human window washers on skyscrapers are being replaced by robots.

tech
A poll has shown that most Americans do not trust information about elections that is generated by artificial intelligence.

A poll has shown that most Americans do not trust information about elections that is generated by artificial intelligence.

tech
How to safeguard your baby monitor from hackers?

How to safeguard your baby monitor from hackers?

tech
The origin of the bizarre "hello" text messages.

The origin of the bizarre "hello" text messages.

tech
Over 900,000 Medicare beneficiaries are at risk of data breach.

Over 900,000 Medicare beneficiaries are at risk of data breach.

tech
Humans can teach robots to sense human touch without the need for artificial skin.

Humans can teach robots to sense human touch without the need for artificial skin.

tech
Apple's daring advancement in AI technology: The release of the iPhone 16, AirPods, and watches.

Apple's daring advancement in AI technology: The release of the iPhone 16, AirPods, and watches.

tech
Conduct a 5-minute phone privacy audit to prevent spying.

Conduct a 5-minute phone privacy audit to prevent spying.

tech
Scams and people search sites: a dangerous intersection

Scams and people search sites: a dangerous intersection

tech
Reach your destination effortlessly with this advanced self-driving sleep pod.

Reach your destination effortlessly with this advanced self-driving sleep pod.

tech
US political campaigns face increased digital attacks from Iranian hackers.

US political campaigns face increased digital attacks from Iranian hackers.

tech
A Chinese robo-helper can perform a variety of tasks, including cleaning, cooking, and even shooting hoops.

A Chinese robo-helper can perform a variety of tasks, including cleaning, cooking, and even shooting hoops.

tech
Four effective strategies for reducing expenses.

Four effective strategies for reducing expenses.

tech