ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

VoIP Has a Spam Problem

VoIP Has a Spam Problem

Robocalls plague the world’s smartphone users, but have you ever stopped to ask why you receive them in the first place? Why are robocallers able to hide behind a local number so that you pick up the phone? Scammers are actually using a business tool you may have heard of… Voice over Internet Protocol, or VoIP, a modern phone solution that in the hands of anyone else is extremely helpful.

How Spam Callers Are Leveraging VoIP

VoIP is great for businesses, but scammers can use it to cause mischief in its own right. Since VoIP uses the Internet to place calls, scammers can work around the call blocks that used to be a way to block their attacks in the past.

VoIP gives cybercriminals the ability to imitate just about any number out there with a process called spoofing. One of the scariest parts about this is that spoofed calls cannot be stopped by the current telephone infrastructure, but it actually gets worse. Since hackers and criminals can spoof a number from your neighborhood, it’s more likely that you’ll answer. They can even spoof your own number, shockingly enough.

Common Scams and Frequently Targeted Areas

This doesn’t mean that a VoIP scammer will call you--all we’re trying to say is that it’s more accessible than it’s ever been before. Some of the more common scams involve a scammer calling a hotel room posing as the front desk to confirm credit card details. It’s much easier and more efficient for a scammer to pull off attacks through the use of automation. Hundreds of potential victims can be robocalled with a spoofed number, with only the ones who pick up the phone being interacted with.

Different areas of the world experience more trouble with spam attacks. The top ten countries for phone spam break down as follows:

  1. Spain, with 24 percent.
  2. The United Kingdom, with 22 percent.
  3. Italy, with 21 percent.
  4. France, with 20 percent.
  5. Argentina, with 10 percent.
  6. The United States, with 10 percent.
  7. Mexico, with 9 percent.
  8. Brazil, with 9 percent.
  9. Chile, with 9 percent.
  10. Australia, with 6 percent.

Furthermore, the United States saw a 46 percent increase in robocall spam in 2018. Among all locations within the U.S., the top ten targeted areas are in Texas, including Austin, Dallas, and Houston.

Can These Calls Be Stopped?

Google has begun the first steps to implement a preventative process utilizing its Google Assistant. When a call is received, the Assistant answers, asks for the reason for the call, and provides a transcript of the response. The recipient then knows whether or not the call is legitimate. This happens on the device, thus keeping your calls private.

The FTC has been given the task of stopping these calls, and steps have been taken to approving another Google technology, STIR/SHAKEN (Secure Telephone Identity Revisited/Signature-based Handling of Asserted information using toKENs), which can potentially authenticate calls by confirming the number is associated with the device making the call.

How often do you receive spoofed calls? What would you do to make them stop? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Small Business Smartphones Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Browser Windows 10 Apps Managed Service IT Support Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Gadgets Artificial Intelligence Managed IT services Networking Windows Workplace Strategy Mobile Device Management WiFi Spam Blockchain Business Technology Bandwidth Encryption Information Server App Virtualization Remote Employee/Employer Relationship Office 365 Apple Information Technology History Gmail Budget Office Two-factor Authentication BDR Cybercrime Conferencing Health Wi-Fi Big Data Access Control Analytics Data Security Remote Monitoring Cost Management Hacker Voice over Internet Protocol IT Management Document Management Compliance Training Employer-Employee Relationship Save Money Help Desk Hacking Remote Computing Vendor Patch Management Computing Vulnerabilities Vendor Management Hard Drive Project Management Money Customer Service Mobile Office Unified Threat Management Legal Firewall Data loss Search... Managed Services Augmented Reality Data storage Best Practice Word Retail IBM Website Alert Hiring/Firing Applications Outlook BYOD Password Antivirus Chrome Laptop Maintenance Monitoring Healthcare Windows 11 Twitter Mobile Computing Websites Social Law Enforcement Remote Workers Sports SaaS Marketing Meetings DDoS Mobility End of Support Printer Windows 7 Running Cable Free Resource Google Maps iPhone Scam Education Storage Cortana How To Content Filtering Travel Virtual Reality VPN Social Engineering Cryptocurrency Router Black Market Update Data Breach Cleaning User The Internet of Things Robot YouTube Paperless Office Wireless Technology Solid State Drive eWaste Cooperation Physical Security Multi-factor Authentication Video Conferencing Chromebook Drones Virtual Machines Downtime PowerPoint Safety Computer Repair Saving Time Administration Automobile Start Menu Professional Services Virtual Desktop Presentation Computer Care Downloads Computers Specifications Bitcoin Experience How To Microchip Vulnerability IT Consultant Flexibility Telephone Software as a Service Managed Services Provider Data Protection Customer Relationship Management Virtual Private Network Co-Managed IT Identity Theft Entertainment Excel Disaster Hack Notifications Unified Communications Current Events Solutions Lithium-ion battery Google Docs Bluetooth Virtual Assistant Distributed Denial of Service Integration Tech Terms Office Tips Images 101 Display Processors Private Cloud Memory Managed IT Digital HIPAA Processor Employees Taxes Avoiding Downtime Politics Machine Learning Settings Holidays Legislation File Sharing News Virtual Machine Keyboard User Tip Business Metrics Evernote Redundancy Hosted Solution Network Management Reviews Smart Technology Optimization Hard Drives Teamwork intranet Books 2FA Cache Unified Threat Management Society Emails Data Storage Inbound Marketing Workers Fake News Hypervisor Wireless Shortcut Language Proxy Server Environment Service Level Agreement Shopping Computing Infrastructure Medical IT Heating/Cooling Windows XP CCTV SQL Server Social Networking Reading Printing Monitors Management Paperless Visible Light Communication Device security Touchscreen Windows 8 Wireless Headphones PCI DSS Microsoft Excel Licensing Tech Emergency Going Green Gig Economy Electronic Payment Supply Chain Business Cards Humor Computer Malfunction Internet Service Provider Azure Relocation Displays Error Business Communications Vendor Mangement Advertising Work/Life Balance Bookmark Tech Support Regulations Compliance Samsung Managed IT Service Term Download Uninterrupted Power Supply Workplace Piracy Memes Phone System Webcam HTML Net Neutrality Human Resources Business Mangement Browsers Nanotechnology Financial Data Tablets Staffing In Internet of Things IP Address Hacks Google Play Network Congestion Upload Risk Management Scams Software License IT Supercomputer Reliable Computing Google Calendar Writing Social Network Google Apps Data Analysis Virus Screen Reader Telework Computer Accessories Microsoft 365 Security Cameras Trends Smartwatch Cables Mobile Technology Communitications Motion Sickness Devices Procurement Scalability Comparison Customer Resource management Google Drive Text Messaging Fileless Malware Proactive IT FinTech Tip of the week Recovery Competition Administrator Bring Your Own Device Knowledge Gamification CES Corporate Profile Point of Sale Company Culture IT Assessment Regulations Supply Chain Management LiFi Employer Employee Relationship Value Entrepreneur Television Telephone System Telephony Directions Music Backup and Disaster Recovery Organization Cabling Shortcuts Cyber security Documents Application Business Intelligence Content Tablet Desktop Smart Devices G Suite Accountants Remote Working Troubleshooting Tracking Mouse Electronic Medical Records VoIP Database AI Be Proactive Trend Micro Securty Botnet Transportation Domains Rental Service Micrsooft Digital Security Cameras Electronic Health Records Web Server Equifax Digital Payment Wasting Time SharePoint Flash Health IT Telephone Systems Business Growth Tactics Worker Workplace Strategies Hard Drive Disposal eCommerce Modem Username Videos Access Surveillance Time Management Startup Business Owner Public Cloud Freedom of Information Managing Costs Banking Navigation Google Wallet Addiction email scam SSID Public Speaking Employer/Employee Relationships Messenger Audit Deep Learning Media Spyware Mobile Security Development Streaming Media

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?