{"id":32354,"date":"2025-11-14T17:14:29","date_gmt":"2025-11-14T16:14:29","guid":{"rendered":"https:\/\/www.recharge.com\/blog?p=32354"},"modified":"2025-11-14T17:23:49","modified_gmt":"2025-11-14T16:23:49","slug":"digital-scams-phishing-smishing-vising","status":"publish","type":"post","link":"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising","title":{"rendered":"Phishing, Smishing, and Vishing: The Digital Scams to Watch Out For in 2025"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In 2025 \u2013 with increasingly sophisticated AI and inventive personalised scams \u2013 complex digital attacks are on the rise. At the beginning of this year, the <\/span><a href=\"https:\/\/www.nationalcrimeagency.gov.uk\/what-we-do\/crime-threats\/fraud-and-economic-crime\"><span style=\"font-weight: 400;\">National Crime Agency reported<\/span><\/a><span style=\"font-weight: 400;\"> that online scam numbers now make up more than half of all fraud cases, citing that \u201c67% of fraud reported in the USA is cyber-enabled.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many of us are aware that these dangers exist, but as technologies and scammers evolve, it can be hard to keep on top of the latest online fraud tricks and internet scams. Stay ahead of evolving cyber security threats with actionable tips and real-world examples to help you identify, and avoid falling victim to, manipulative digital attacks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What is Smishing and Vishing and Phishing?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">When it comes to online fraud prevention, it\u2019s important to know exactly what to look out for. But what is smishing and phishing? You may have heard of phishing, meaning email scams \u2013 smishing is the same type of online scams, but over text message instead. Vishing, on the other hand, is via phone call. Ultimately, all have the same aim \u2013 they\u2019re designed to infiltrate networks, gain personal information and extract money.\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Phishing: <\/b><span style=\"font-weight: 400;\">fake emails that try to steal your data or convince you to send money<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Smishing:<\/b><span style=\"font-weight: 400;\"> mobile scams through SMS or text messages<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Vishing:<\/b><span style=\"font-weight: 400;\"> meaning phishing through voice calls or phone scams<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><b>What are the Four Types of Phishing?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">While the three mentioned above \u2013 phishing, smishing and vishing \u2013 are the most well-known, there is a fourth type of digital scam: spear phishing. It\u2019s email phishing, but specifically targeted to the recipient and appears to be from legitimate senders: someone you know, or a company you use regularly.<\/span><\/p>\n<p><b>The Four Types of Phishing are:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Phishing\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Spear phishing\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Smishing<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vishing<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><b>What are the 4 P&#8217;s of Phishing?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The 4 P\u2019s of phishing refer to the tactics used to trick victims in online scams:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pretend: scammers pretend to be a person you know, an organisation or trusted company such as your bank or HMRC, to try and gain your trust.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Problem: they\u2019ll claim there\u2019s a problem that needs your attention \u2013 a security breach or an overdue tax bill.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pressure: the message may contain calls to act instantly or refer to a deadline like \u201cact before your account is suspended\u201d. You\u2019ll feel like you have to act quickly, which could mean you don\u2019t fully think it through.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pay: this is the end goal \u2013 whether you click on a link that leads to a malware download or a malicious site, provide sensitive information like passwords or bank details, or even make a payment.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Want to know more on what to look out for? It\u2019s good practice to get used to recognising online scams, and spotting suspicious-looking messages is the first step. For example, if you were asked which of the following emails is most likely a phishing attempt \u2013 which would you choose?<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Your bank requesting your password.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A HMRC email with the subject line \u201cImmediate action required&#8221;.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A parcel company claiming you need to pay charges before they can deliver your order.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Your car insurance provider encouraging you to update your information addressing you as \u201caccount holder\u201d and containing some obvious typos.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A brand you frequently shop with promoting an unbelievable offer if you follow the link.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The answer is actually: all of them. Every one of the above is a common type of phishing tactic which scammers frequently use.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Phishing Scams 2025<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The good news is that avoiding phishing attacks can be easy, once you know how. In their identity theft protection effort, the <\/span><a href=\"https:\/\/www.ncsc.gov.uk\/collection\/phishing-scams\/spot-scams\"><span style=\"font-weight: 400;\">National Cyber Security Centre<\/span><\/a><span style=\"font-weight: 400;\"> advises to look out for the following telltale signs:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Urgent or threatening language<\/b><span style=\"font-weight: 400;\"> \u2013 encouraging you to \u201cact now\u201d.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Requests for personal information <\/b><span style=\"font-weight: 400;\">\u2013 most companies will never ask you for passwords or pin numbers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Suspicious links or attachments <\/b><span style=\"font-weight: 400;\">\u2013 hover over the link to see where the link will take you. Unless you recognise it as a legitimate website, don\u2019t click on it.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spelling and grammar errors<\/b><span style=\"font-weight: 400;\"> \u2013 a sign of unprofessionalism, something reputable companies avoid.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Generic greetings<\/b><span style=\"font-weight: 400;\"> \u2013 most brands will use your name.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">And, it&#8217;s not just email phishing that these apply to. You\u2019ll find similar scams being used over text messages and calls, too.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What is Smishing?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Smishing is phishing over SMS or text message. But what might an example of smishing phishing look like? Much like emails, it can be any message claiming to be from a trusted source.\u00a0<\/span><\/p>\n<p><b>Smishing scams 2025:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A fake text claiming to be from your bank asking you to click a link to \u201cverify your account\u201d.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A message purporting to be a delivery company \u201cunable to release your parcel unless you pay a charge\u201d.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">AI-personalisation creating convincing messages that reference your name or other personal information, or social media posts.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Many people ask: \u201cis smishing the same as spoofing?\u201d And while they aren\u2019t the same, spoofing is a type of smishing. While smishing is the act of sending texts to scam you, spoofing is specifically the act of faking a sender\u2019s identity, pretending to be a company you use or a person you know.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What Happens If You Click on a Smishing Text?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If you open a link in a smishing text, it might download malware or direct you to a fake site that steals your login details. Anti-virus company <\/span><a href=\"https:\/\/uk.norton.com\/blog\/online-scams\/i-clicked-on-a-phishing-link\"><span style=\"font-weight: 400;\">Norton<\/span><\/a><span style=\"font-weight: 400;\"> share what can happen, including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Data exfiltration: <\/b><span style=\"font-weight: 400;\">if a phishing link infects your device with malware, an attacker may be able to transfer data from your device to a remote account in order to steal personal files and information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Keystroke logging:<\/b><span style=\"font-weight: 400;\"> this software records what you type on your device, meaning it records sensitive information like your passwords and credit card information and sends it to the scammer.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Remote control access: <\/b><span style=\"font-weight: 400;\">this allows hackers to remotely control your device. They may be able to track your activity, access files, or use your webcam to take screenshots or record you.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Takes you to a spoofed website: <\/b><span style=\"font-weight: 400;\">essentially a faked website that may look very close to its legitimate counterpart. This may trick you into entering personal data like banking details or passwords, which hackers can then steal.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><b>What Should I Do If I Get a Smishing Text?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If you\u2019ve received a smishing SMS, take steps to protect yourself:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don\u2019t click on any links.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don\u2019t provide any personal information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If you\u2019re unsure, use official contact information to get in touch with the company to verify the message.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If you think it\u2019s a scam, report and block the sender.\u00a0<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">How to report a scam? The <\/span><a href=\"https:\/\/www.ncsc.gov.uk\/collection\/phishing-scams\/report-scam-text-message\"><span style=\"font-weight: 400;\">National Cyber Security Centre advises<\/span><\/a><span style=\"font-weight: 400;\">: \u2018Most phone providers are part of a scheme that allows customers to report suspicious text messages for free by forwarding it to 7726\u2019.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What is a Vishing Scammer?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Vishing is phishing over a phone call, or voice call. Someone may phone you pretending to be from a trusted company or bank, to try and trick you into giving personal information. And what about a vishing example? Just like phishing and smishing do, they may say you need to update your details, or urgently pay a fee.<\/span><\/p>\n<p><b>Vishing scams 2025:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A scammer calls pretending to be your bank, saying there\u2019s \u201csuspicious activity\u201d on your account and asking for your card number.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You get a call from a friend asking for an urgent loan as they\u2019re stuck somewhere and unable to get home.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A caller claims you\u2019ve won a competition, but you need to pay a fee before they can release the prize.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Online fraud is becoming more sophisticated. Learn how to protect yourself from phishing, smishing, and vishing scams.<\/p>\n","protected":false},"author":45,"featured_media":32339,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"cos_headline_score":0,"cos_seo_score":0,"cos_headline_text":"Phishing, Smishing, and Vishing: The Digital Scams to Watch Out For in 2025","cos_headline_has_been_analyzed":false,"cos_last_analyzed_headline":[],"_hreflang_tags":"","footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[169],"tags":[],"class_list":["post-32354","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-safety-online-en"],"jetpack_publicize_connections":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.4 (Yoast SEO v21.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital Scams 2025: What Watch Out For | Recharge<\/title>\n<meta name=\"description\" content=\"Online fraud is becoming more sophisticated. Learn how to protect yourself from phishing, smishing, and vishing scams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing, Smishing, and Vishing: The Digital Scams to Watch Out For in 2025\" \/>\n<meta property=\"og:description\" content=\"Online fraud is becoming more sophisticated. Learn how to protect yourself from phishing, smishing, and vishing scams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising\" \/>\n<meta property=\"og:site_name\" content=\"Recharge Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-14T16:14:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-14T16:23:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/creativegroup-blog-prd-eu-west-1-recharge-blog.s3.eu-west-1.amazonaws.com\/blog\/wp-content\/uploads\/2025\/11\/14171400\/Phishing_Smishing_and_Vishing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"491\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Josie England\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising\",\"url\":\"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising\",\"name\":\"Digital Scams 2025: What Watch Out For | Recharge\",\"isPartOf\":{\"@id\":\"https:\/\/www.recharge.com\/blog\/en\/#website\"},\"datePublished\":\"2025-11-14T16:14:29+00:00\",\"dateModified\":\"2025-11-14T16:23:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.recharge.com\/blog\/en\/#\/schema\/person\/85c65fa08f1ab98cae81f8a9db2fa290\"},\"description\":\"Online fraud is becoming more sophisticated. Learn how to protect yourself from phishing, smishing, and vishing scams.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.recharge.com\/blog\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing, Smishing, and Vishing: The Digital Scams to Watch Out For in 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.recharge.com\/blog\/en\/#website\",\"url\":\"https:\/\/www.recharge.com\/blog\/en\/\",\"name\":\"Recharge Blog\",\"description\":\"Everything about online safety, smart spending &amp; your digital lifestyle.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.recharge.com\/blog\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.recharge.com\/blog\/en\/#\/schema\/person\/85c65fa08f1ab98cae81f8a9db2fa290\",\"name\":\"Josie England\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.recharge.com\/blog\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/18668e081a4126442d8bca61175582e4e1ca5cd35b4827f7e59f15b5d6deeb57?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/18668e081a4126442d8bca61175582e4e1ca5cd35b4827f7e59f15b5d6deeb57?s=96&d=mm&r=g\",\"caption\":\"Josie England\"},\"url\":\"https:\/\/www.recharge.com\/blog\/en\/author\/josie-england\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Digital Scams 2025: What Watch Out For | Recharge","description":"Online fraud is becoming more sophisticated. Learn how to protect yourself from phishing, smishing, and vishing scams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising","og_locale":"en_US","og_type":"article","og_title":"Phishing, Smishing, and Vishing: The Digital Scams to Watch Out For in 2025","og_description":"Online fraud is becoming more sophisticated. Learn how to protect yourself from phishing, smishing, and vishing scams.","og_url":"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising","og_site_name":"Recharge Blog","article_published_time":"2025-11-14T16:14:29+00:00","article_modified_time":"2025-11-14T16:23:49+00:00","og_image":[{"width":900,"height":491,"url":"https:\/\/creativegroup-blog-prd-eu-west-1-recharge-blog.s3.eu-west-1.amazonaws.com\/blog\/wp-content\/uploads\/2025\/11\/14171400\/Phishing_Smishing_and_Vishing.png","type":"image\/png"}],"author":"Josie England","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising","url":"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising","name":"Digital Scams 2025: What Watch Out For | Recharge","isPartOf":{"@id":"https:\/\/www.recharge.com\/blog\/en\/#website"},"datePublished":"2025-11-14T16:14:29+00:00","dateModified":"2025-11-14T16:23:49+00:00","author":{"@id":"https:\/\/www.recharge.com\/blog\/en\/#\/schema\/person\/85c65fa08f1ab98cae81f8a9db2fa290"},"description":"Online fraud is becoming more sophisticated. Learn how to protect yourself from phishing, smishing, and vishing scams.","breadcrumb":{"@id":"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.recharge.com\/blog\/en\/us\/digital-scams-phishing-smishing-vising#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.recharge.com\/blog\/en"},{"@type":"ListItem","position":2,"name":"Phishing, Smishing, and Vishing: The Digital Scams to Watch Out For in 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.recharge.com\/blog\/en\/#website","url":"https:\/\/www.recharge.com\/blog\/en\/","name":"Recharge Blog","description":"Everything about online safety, smart spending &amp; your digital lifestyle.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.recharge.com\/blog\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/www.recharge.com\/blog\/en\/#\/schema\/person\/85c65fa08f1ab98cae81f8a9db2fa290","name":"Josie England","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.recharge.com\/blog\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/18668e081a4126442d8bca61175582e4e1ca5cd35b4827f7e59f15b5d6deeb57?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/18668e081a4126442d8bca61175582e4e1ca5cd35b4827f7e59f15b5d6deeb57?s=96&d=mm&r=g","caption":"Josie England"},"url":"https:\/\/www.recharge.com\/blog\/en\/author\/josie-england"}]}},"jetpack_featured_media_url":"https:\/\/creativegroup-blog-prd-eu-west-1-recharge-blog.s3.eu-west-1.amazonaws.com\/blog\/wp-content\/uploads\/2025\/11\/14171400\/Phishing_Smishing_and_Vishing.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.recharge.com\/blog\/en\/wp-json\/wp\/v2\/posts\/32354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.recharge.com\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.recharge.com\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.recharge.com\/blog\/en\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.recharge.com\/blog\/en\/wp-json\/wp\/v2\/comments?post=32354"}],"version-history":[{"count":1,"href":"https:\/\/www.recharge.com\/blog\/en\/wp-json\/wp\/v2\/posts\/32354\/revisions"}],"predecessor-version":[{"id":32355,"href":"https:\/\/www.recharge.com\/blog\/en\/wp-json\/wp\/v2\/posts\/32354\/revisions\/32355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.recharge.com\/blog\/en\/wp-json\/wp\/v2\/media\/32339"}],"wp:attachment":[{"href":"https:\/\/www.recharge.com\/blog\/en\/wp-json\/wp\/v2\/media?parent=32354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.recharge.com\/blog\/en\/wp-json\/wp\/v2\/categories?post=32354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.recharge.com\/blog\/en\/wp-json\/wp\/v2\/tags?post=32354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}