If You Use a Cell Phone You Should Know What ‘Smishing’ is

The theft of information such as user names and passwords, credit card and bank account information has extended its scope to mobile communications.

Tuesday, May 10, 2011

A variant of ‘phishing’ attacks which targets users of personal computers, ‘smishing’ uses social engineering techniques to obtain sensitive information for criminal purposes, using mainly text messages sent to cell phones.

As noted by Miguel Cisterna in his article in Americaeconomia.com, "The current capabilities of cell phones to access mobile banking transactions, bill payments, mail and various other internet operations with authentication, are the magnet that is attracting smishing attacks. "

More on this topic

Bank Security Forum in Panama

October 2014

On October 22nd the sixth bank security forum in Panama will he held and will address issues related to risk management and security of transactional systems.

The event being run by the Banking Association of Panama (ABP), will discuss issues such as the form and migration of the crime of bank robbery, cyber Banking Security, Security for ATM's, computer crimes and research methods in Panama, among others.

Amendments to Computer Crime Law in Costa Rica

April 2013

Lawmakers voted so that no journalist, citizen or public official should again feel afraid of filing complaints of corruption.

It is no longer a crime to publicise and disseminate information of public interest, nor is collecting, copying and use of information by financial institutions supervised by Sugef.

Simulated Cyber Attack in Guatemala

February 2013

In May the websites of banks, energy distribution companies, ministries, and all those handling sensitive information will be attacked by ethical hackers.

Elperiodico.com.gt reports that "The Inter-American Committee Against Terrorism (CICTE), assigned to the OAS, has on its agenda for next May an attack of websites belonging to banks, power distribution companies, ministries and public secretariats and all those who handle sensitive information. Javier Soberano, CICTE Program Manager, explained that the exercise seeks to activate response protocols of institutions and crisis management at the time of weakness in their cyber infrastructure. "

Guatemala: No Cybercrime Laws

October 2010

The lack of regulation is a disadvantage for authorities in the combat against such crimes.

Rony Lopez, prosecutor against organized crime, told Prensalibre.com, "We are facing organized crime with what we can; help has come from the telephone companies, court orders, the collaboration of private initiative and, above all, parents, which authorize review of their children´s accounts."

 close (x)

Receive more news about IT & Telecomm

Suscribe FOR FREE to CentralAmericaDATA EXPRESS.
The most important news of Central America, every day.

Type in your e-mail address:

* Al suscribirse, estará aceptando los terminos y condiciones

Tailor made software for construction companies

O4Bi is a system that allows to control and manage what a company needs: the complete process of development of works, accounts receivable, treasury, banks, sales and accounting.
O4Bi is a very robust system that allows to control and...

Stock Indexes

(Apr 6)
Dow Jones
S&P 500


(Jan 20)
Brent Crude Oil
Coffee "C"