Hikvision Senior Director of Cybersecurity: Examples of Vishing and Six Tips to Protect Yourself from Vishing, Part 2

August 4, 2020

Hikvision HikWire blog article Chuck Davis Vishing Part 2

In yesterday's blog, Hikvision senior director of cybersecurity, Chuck Davis, covered security concerns related to vishing scams. Today’s blog will outline examples of vishing to help you prevent becoming a victim.

Vishing is a combination of the word “voice” and the word “phishing”. It’s a form of phishing that uses voice calls rather than email to trick a victim into divulging personal, sensitive or confidential information to an attacker. It’s a new term for the old phone scam. Below, we provide examples of vishing so you can learn to identify them.

Examples of Vishing
Episode 69 of Darknet Diaries shares an example of vishing. The entire episode is insightful, but the story that includes vishing begins at 50 minutes: 29 seconds.

In 2018, KrebsOnSecurity wrote about how some technology experts have even been scammed or nearly scammed by some clever vishing attacks.

Not all vishing calls are made to the victim. In the video below, you will see how a social engineer at the DefCon hacking conference was able to take over a reporter’s cell phone account (with permission) just by making a phone call:


Six Tips to Protect Yourself from Vishing
Below are six ways you can protect yourself from a vishing attack:

  1. Don’t give personal, sensitive information to anyone who calls you directly unless you can absolutely verify their authenticity.
  2. If you do get a call that could be a vishing attack, look up the phone number of the company and call them back. However, be careful because some vishers are setting up rogue sites to give false phone numbers so use extra caution when looking up the phone number.
  3. Understand that attackers may have some information about you when they call.
  4. Don’t answer calls from unfamiliar numbers.
  5. Don’t pay callers with gift cards or wire transfers. Scammers want these as payment because they are almost impossible to track and you have no way to reverse the charges. Instead, make payments with a credit card.
  6. Report any vishing attacks:
  • If you’ve lost money to a phone scam or have information about the company or scammer who called you, report it at
  • If you didn’t lose money and just want to report a call, you can use the FTC’s streamlined reporting form at

For more tips to increase awareness of cyberattacks and other security concerns, check out our cyber blogs.

IMPORTANT! This model requires non-standard firmware. Do Not Install standard firmware (e.g. v.4.1.xx) on this model. Doing so will permanently damage your system. You must use custom firmware v.4.1.25 from the iDS-9632NXI-I8/16S product page.

By downloading and using software and other materials available via this website, you agree to be legally bound by HIKVISION General Terms of Use . If you don’t agree to these terms, you may not download or use any of those materials.

If you are agreeing on behalf of your company, you represent and warrant that you have legal authority to bind your company to the General Terms of Use above. Also you represent and warrant that you are of the legal age of majority in the jurisdiction in which you reside (at least 18 years of age in many countries).