ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scammers Targeting Amazon Users

Scammers Targeting Amazon Users

It’s the holiday season, and with it comes a multitude of hackers trying to cash in on everyone’s online purchases. These phishing scams always increase when the holiday season comes around, so it’s best to stay vigilant so that you don’t give yourself the gift of sadness this year. One such threat is already here, and it’s voice spoofing of Amazon orders.

In this case, an email scam is circulating which encourages users to call a number listed to confirm an order, usually one with a large price. This nasty trick is intended to harvest phone numbers and credit card numbers for later exploitation. Security researchers Avanan have found that the contact number listed on the email is not Amazon; it is instead a scammer who records the phone number with Caller ID. Afterwards, the user will be contacted by the scammer, who requests that the user provide financial information in order to cancel the order.

We think enough people are familiar with Amazon now to determine that there are several red flags with this scenario. First of all, you know how to cancel an Amazon order; just log into your account and do it from there. Second, if you placed an order with Amazon, why would you have to reconfirm your financial information when it is already on file? It just doesn’t make sense, and that’s the point we are trying to make. A lot of these issues can be resolved simply by slowing down, taking a step back, and not rushing to conclusions or to resolve a problem that does not exist.

Scams involving online retailers are nothing new, but this particular scam is notable because the emails that get sent out are able to make it past spam blockers and content filters. It does this by including legitimate links within the body of the email, meaning that your email solution doesn’t necessarily flag it immediately.

We offer the following advice to you:

  • Don’t call numbers you don’t recognize.
  • Don’t click on suspicious links in your email inbox.
  • Don’t give out your personal information or credit card information just because someone on the phone told you to.
  • Check the sender for any message you feel is suspicious to ensure it is legitimate.
  • Check your account before responding to any correspondence from the sender.
  • Set up multi-factor authentication, just in case.

Stay safe this holiday season with ClearView IT. We can help your business stay secure through advanced industry-standard security solutions designed to protect your organization. To learn more, reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Network Mobile Devices Communication Managed IT Services Data Recovery Productivity Quick Tips VoIP Social Media Users Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Disaster Recovery Passwords Holiday Covid-19 Managed Service Windows 10 Apps IT Support Browser Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Managed IT services Windows Gadgets Workplace Strategy Artificial Intelligence Networking Remote App Virtualization Spam Business Technology Mobile Device Management Blockchain Bandwidth WiFi Encryption Server Information Gmail Employee/Employer Relationship Office Two-factor Authentication Budget Office 365 History Apple Information Technology Big Data BDR Wi-Fi Health Analytics Cybercrime Conferencing Access Control Data Security Patch Management Help Desk Vendor Hacking Save Money Remote Monitoring Voice over Internet Protocol Employer-Employee Relationship Hacker IT Management Training Cost Management Remote Computing Compliance Document Management Data storage Applications Project Management Vulnerabilities Search... Best Practice Mobile Office BYOD Retail Money Computing Alert Managed Services Customer Service Vendor Management Hard Drive Unified Threat Management Hiring/Firing Data loss Firewall Outlook Augmented Reality Password Word IBM Legal Website Paperless Office Antivirus Mobile Computing The Internet of Things Travel Maintenance YouTube Marketing Virtual Reality Social Engineering Running Cable Cryptocurrency Monitoring Black Market Laptop Cleaning Healthcare Websites Storage Robot Remote Workers Meetings Mobility Windows 7 Free Resource Google Maps Social Scam Sports SaaS DDoS How To User VPN Twitter iPhone Windows 11 Education Cortana Update Law Enforcement Content Filtering End of Support Chrome Printer Data Breach Router Administration Holidays Notifications Unified Communications Processor Presentation Specifications Cooperation Google Docs Video Conferencing Physical Security Bluetooth IT Consultant Distributed Denial of Service Office Tips Virtual Machines Computer Repair Private Cloud Customer Relationship Management Memory Wireless Technology Multi-factor Authentication Co-Managed IT Professional Services eWaste Entertainment Start Menu Computer Care Downloads Vulnerability Saving Time Downtime Politics Machine Learning Safety Settings Software as a Service Managed Services Provider Bitcoin Data Protection Computers Virtual Desktop Virtual Private Network Solid State Drive Telephone Experience HIPAA Current Events Chromebook Drones Excel Solutions Automobile Disaster Integration Tech Terms Images 101 How To Display Managed IT Microchip Virtual Assistant Lithium-ion battery Digital Flexibility Employees Taxes Avoiding Downtime Hack Processors PowerPoint Identity Theft Health IT Securty Equifax SSID Domains Hard Drive Disposal Employer/Employee Relationships Audit Media Scams Electronic Payment Spyware Tactics Development Scalability Username Administrator File Sharing Virtual Machine Text Messaging Proactive IT Redundancy Reviews Startup Optimization Bring Your Own Device Freedom of Information Cache Addiction Phone System email scam Teamwork Navigation 2FA Cables Unified Threat Management Data Storage Workers Mobile Security Hypervisor Music News Medical IT User Tip Shopping Legislation Public Speaking Network Management CCTV SQL Server Printing Evernote Paperless Point of Sale Streaming Media Touchscreen PCI DSS Botnet Licensing Keyboard Computer Accessories Computer Malfunction Fake News Micrsooft Emergency Proxy Server Gig Economy Shortcuts Emails Humor Rental Service Hard Drives Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Flash intranet Business Communications Management Regulations Compliance Wireless Samsung Device security Managed IT Service Telephone Systems Shortcut Business Growth Webcam Microsoft Excel Environment Be Proactive Uninterrupted Power Supply Wireless Headphones Memes Heating/Cooling Windows XP Business Mangement Going Green Net Neutrality Business Cards Social Networking Tech Human Resources Error Financial Data Tablets Banking Google Wallet Deep Learning Bookmark Risk Management Workplace Strategies IT Messenger Download Supercomputer Piracy Google Calendar Term Google Apps Virus Telework Troubleshooting HTML Business Metrics Hosted Solution Motion Sickness Microsoft 365 Browsers Smartwatch Nanotechnology Communitications Books Google Drive Upload Procurement Software License Language Society Comparison Google Play Social Network FinTech Staffing IP Address Monitors Visible Light Communication Knowledge Data Analysis CES Smart Technology Corporate Profile Screen Reader IT Assessment Reading Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Windows 8 Television Security Cameras Customer Resource management Organization Business Owner Cabling Devices Cyber security G Suite Tip of the week Displays Advertising Fileless Malware Tablet Smart Devices Relocation VoIP Gamification Remote Working Tracking Company Culture Work/Life Balance Tech Support Mouse Telephone System AI Recovery Regulations Trend Micro Competition Web Server Transportation Directions Digital Security Cameras Supply Chain Backup and Disaster Recovery Electronic Health Records LiFi Content In Internet of Things Digital Payment Desktop Wasting Time Entrepreneur SharePoint Electronic Medical Records Documents Inbound Marketing Worker Accountants eCommerce Hacks Application Modem Network Congestion Writing Business Intelligence Videos Workplace Access Database Surveillance Reliable Computing Time Management Public Cloud Managing Costs

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?