All you need to do is find an online spoofing service 

Telephone spoofing is easy to do, all you have to do is create an account on a website, enter a few telephone numbers and you get to call someone as if you were someone else.

Once logged in, you select the options and initiate the calling process, the call is bridged and the person on the other end receives your call.

The receiver would normally assume that the call was coming from a different phone number chosen by you, making the recipient think that the call was coming from someone other than the caller.

In this way, as you can see it is so easy to spoof a Caller ID and ‘trick’ the target user.

Some of these services also provide an option to change the tone of your voice so that people cannot recognise you.

The implications of doing this can be a potential goldmine for scammers

Identity thieves can use spoofed numbers to steal information from you, such as your bank account or banking login details, they use spoofing to pretend they’re calling from your bank or credit card company or even a utility company.

They use spoofing to hide their identity or to try to mimic the number of a real company or person who has nothing to do with the real caller.

This technology is so accessible and easy to use that there has been a 60% rise in this kind of fraud over the past 2 years.

The fraudsters pretend to be bank staff or government employees and attempt to persuade you to hand over personal details, passwords and even Pin numbers.

Sometimes they’ll send a text to your mobile phone, which will show up as having come from your bank. Once the payment has gone through you’ll receive another message acknowledging the transaction, confirming your belief that it’s genuine.

There have also been cases of SMS frauds where people send messages to you using a managing director’s mobile number to a secretary or accounts department directing a bank transfer. This is a take on the email CEO Fraud.


Here at CYBER123 we believe that prevention and training is the best way to secure your digital world. If we can train you on what things to spot, how scams and cybercrime works then we believe you are less likely to become a victim. Our unique training offers scenarios and advice on what to spot how to protect yourself and how to deal with the scams and frauds that are about in the world today.

Understanding the resources that support critical functions and the related cyber security risks enable businesses to define resources and efforts in mitigating the risks

CALL US:  +44 (0)20 3457 4683 EMAIL US:


If I have your work email address, generally, now I will have your first name and surname and the company you work for.


Firstly, if your Instagram account has been hacked then there is a good chance your email has been hacked as well. What you would need to do first would be to report it to Instagram.


Telephone spoofing is easy to do, all you have to do is create an account on a website, enter a few telephone numbers and you get to call someone as if you were someone else.

Is your child being Cyber Bullied

Parents can find it difficult to tell the difference between the emotional development of their children or whether something more sinister is taking place.
A lot of the times it is normal for growing children to have mood swings, quiet periods, manic periods and changes of emotional circumstance but sometimes these can also be a sign that they are being bullied or bullying others.

From Xero to Zero

To test and check the security of Xero online accounting software I wanted to see if they were susceptible to MITM attacks. I created a trial account and signed up and logged into Xero using standard 1FA (1 Factor Authentication –ie, password). I installed the Xero APP on my phone and Logged in being able to Skip MFA (Multiple Factor Authentication).

Three Mobile Data Breach

According to news reports some 6 million customer records have been stolen from Three Mobile (one of the UK’s largest mobile network providers). In order to commit this type of upgrade fraud the attackers must have used authorised login credentials to access the upgrades systems. Data accessed would have included names, phone numbers, addresses and date of births of customers.

Three reasons to worry about worms

Worms are a type of malware similar to viruses in that it is self-replicating. However, worms don’t generally attach themselves to applications. Why should you worry about worms?

The Day the Internet Died

Twitter, Spotify, Reddit, PSN and a whole load of other internet services and websites were down or left partially working on Friday. This happened when hackers launched an extremely large Distributed Denial of Service (DDoS) attack on Dyn DNS Servers. Dyn is a major host of internet DNS servers. It looks like Dyn was hit with up to 4 attacks lasting most of Friday.

3 reasons to worry about spyware

Obviously spyware is not something that you would like to have on your computer, tablet or mobile phone but should you be worried about spyware? Some of the stories I have heard are just scary!

Are you infecting your customers?

Earlier in the year mobile provide O2 had marketing campaign where they were promoting an e-book. To distribute their e-book they sent out free USB memory sticks to their customers. Unfortunately for them the e-book wasn’t the only thing on the USB sticks and unwitting customers that plugged the USB sticks into a windows devices found themselves infect with a virus.


Footer Contact

2 + 15 =

Share This

Share this post with your friends!