Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site.... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Guides

Suspicious phone calls: how to defend yourself

Learn how to recognize suspicious calls, avoid scams and protect your personal data with expert cyber security tips.

Blocking scam calls

Table of contents

  • What are suspicious calls?
  • How to recognize a suspicious call
  • Tools to protect yourself

Suspicious calls have become an increasingly common threat. These are calls designed to scam users, steal sensitive information, or trick people into installing harmful software.

In this article, we’ll explore how to identify these calls, understand the typical behavior of scammers, and learn how to protect your digital security.

What are suspicious calls?

Suspicious calls are unsolicited calls from unknown or masked numbers, often made with the intent of financial fraud or gaining access to your data.

The caller may pose as a bank representative, a government agency, a tech support agent, or even a relative in distress. In some cases, no one speaks: the mere act of answering confirms that your number is active, increasing your chances of receiving more scam calls.

How to recognize a suspicious call

Recognizing a suspicious call isn’t always easy, especially when scammers use increasingly sophisticated tactics and mimic the tone, language, and authority of legitimate institutions.

However, there are several warning signs that can help you detect a scam if you know what to listen for.

One of the most obvious red flags is a sense of urgency or alarm. Fraudsters often try to create panic so that the victim acts quickly and without thinking. A typical example is:

"Good morning, we're calling from your bank. Your account has been locked due to suspicious activity. We need to confirm your details immediately to restore access."

Or:

"There have been unusual transactions on your account. If you don’t act now, your funds could be at risk."

This type of phone-based phishing, also known as vishing, relies on putting pressure on the target. These calls often come at strategic times—lunchtime, late at night, or on weekends—when people are tired, distracted, or less alert.

Another clue is the origin of the call. If you receive a call from an unknown international number, and you have no contacts abroad, be wary. Scammers sometimes use foreign numbers (like +231, +44, +375) to hide their true identity or to lure you into calling back—sometimes triggering expensive premium-rate charges.

Example
The so-called “one-ring scam”, where your phone rings once and the scammer hopes you’ll call back out of curiosity.

Beyond the number itself, the language used during the call can reveal a lot. If the caller uses generic terms like “Dear customer” or cannot clearly identify you by name or details, it may be a recorded message or a mass scam attempt.

These automated calls often use robotic voices and prompt you to “press 1 to speak with an agent”—which is another trap.

Even more dangerous are requests for sensitive information, like credit card numbers, PINs, or OTP codes (one-time passwords) sent to your phone. No legitimate organization—bank or otherwise—will ever ask for this kind of information over the phone. A typical scam might go like this:

"To complete your identity verification, please read us the 6-digit code you just received."


In truth, the scammer is using that code to complete a fraudulent transaction on your behalf.

Lastly, be cautious of offers that sound too good to be true. If someone calls claiming you’ve won a prize, a trip, or a brand-new smartphone—especially when you never entered any contest—it’s almost certainly a scam.

“Congratulations! You’ve been selected to receive an exclusive reward. We just need a photo ID and your bank account number to deliver your gift.”

Here, the scammer’s goal is again to steal personal data and possibly access your financial information.

In short, always be skeptical of calls that pressure you to act quickly, ask for sensitive data, or promise something extraordinary with no clear reason. In the world of cyber security, caution is not paranoia—it’s smart self-defense.

Why they are dangerous

Interacting with a suspicious call is far from harmless. Even if it seems like a simple phone conversation, the consequences can be serious—ranging from financial losses to breaches of digital security and identity theft.

One of the most subtle threats is voice recording. Some scammers don’t immediately ask for personal information or money. Instead, they try to get you to say “yes” or give a verbal confirmation to a seemingly harmless question like:

“Is this the account holder?”

With this recording, scammers may attempt to enroll you in paid services or initiate transactions, presenting your voice as proof of consent. This is known as voice fraud, and it’s on the rise.

It’s particularly dangerous because it uses your real voice against you, making the fraud harder to dispute.

Another serious risk is malware infection. After the call, the scammer might send you an SMS or email that seems related to your previous conversation. The message might say:

“Dear customer, to complete the procedure we just discussed, please click the following link.”

That link could lead to a malicious download—a file that installs malware on your device. Once infected, your phone or computer could be used to steal passwords, monitor your activity, or even lock you out of your files with ransomware, demanding payment to restore access.

Example
This type of scam has become common with fake delivery notifications (e.g., pretending to be DHL or FedEx), sent shortly after a fraudulent call.

Even something as simple as confirming personal details over the phone—your full name, address, or tax ID—can put your digital identity at risk.

Scammers often collect bits of information from various sources, including social media, and combine them to build detailed victim profiles. These profiles can be used for identity theft, including accessing bank accounts, applying for credit, or impersonating you for other fraudulent activities.

Another often-overlooked danger is confirming your number is active. By answering a suspicious call—even briefly—you signal that your phone number is real and in use.

This makes it more valuable on the black market, where it can be sold to other scammers or shady telemarketing groups, triggering an avalanche of unwanted calls, scam texts, and intrusion attempts.

In short, answering or engaging with a suspicious call can lead to:

  • Voice recordings used in fraud attempts
  • Malware or ransomware infection through follow-up links
  • Identity theft through personal data exposure
  • Privacy violations and a surge in spam or scam attempts

This is why, in the realm of cyber security, even the most ordinary interaction—like picking up the phone—can be the starting point of a much larger breach. Caution and awareness are key.

What to do if you’re unsure

When you receive a suspicious call, the most important thing is to stay calm and not share any personal information over the phone—especially if you didn’t initiate the call yourself. Even if the caller sounds professional or uses the name of a legitimate organization, treat the situation with caution.

Scammers often ask for sensitive data like:

  • Your credit card number
  • PINs or security codes
  • A one-time password (OTP) sent to your phone
  • Your tax ID number, address, or other personal details

If you’re asked for any of this information, hang up immediately. Legitimate banks, government offices, or customer support services will never request confidential data over the phone, especially in an urgent or threatening manner.

Correct behavior, in case of doubt, is to hang up and call the entity that the scammer claimed to represent yourself, using official sources.

Example
If you receive a call from someone who presents himself as a customer service operator for your bank, do not trust the number shown on the display (it could be falsified with spoofing techniques). Open the official app or the bank’s website, retrieve the correct number and call yourself to verify whether the report was real.

Practical example
A user received a call from a so-called INPS employee who asked for the IBAN number to credit a refund. Instead of providing the information, he hung up, called the official INPS toll-free number, and discovered that no communication had come from them. The damage was avoided.

After hanging up, it’s a good idea to block the number using your phone’s settings. While this doesn’t prevent other calls from different numbers, it does limit follow-up attempts from that specific scammer.

However, blocking alone isn’t enough. It’s equally important to report the call to the appropriate authorities. In Italy, you can:

  • File a complaint with the Postal Police (Polizia Postale) via the official portal: www.commissariatodips.it
  • Register your number with the Public Do-Not-Call List (Registro Pubblico delle Opposizioni) to reduce telemarketing calls, although this won’t stop actual fraud attempts
  • Use call-filtering and caller ID apps like TrueCaller or Dov’è, which rely on community reports to flag scam numbers

If the suspicious call involves sensitive topics like banking, pensions, payments, or even your safety, it’s also wise to inform your friends and family—especially older relatives who may be more vulnerable.

Scammers often target seniors, relying on their trust and unfamiliarity with digital threats.

Cyber security

Tools to protect yourself

Protecting yourself from suspicious calls is absolutely possible—even if no system is 100% foolproof. However, using the right tools and adopting good digital habits can significantly reduce the risk of falling victim to phone scams.

One of the most effective solutions is installing caller ID and spam-blocking apps. Tools like Truecaller, Hiya, Should I Answer?, and CallApp help you identify unknown numbers based on large user-driven databases.

Example
If a number has already been reported hundreds of times as a “bank scam,” the app will flag it, allowing you to avoid answering or block it immediately.

Most modern smartphones also include built-in features that help detect unwanted calls. On Android devices, for instance, the Google Phone app may display a “suspected spam” label while the phone is ringing.

On iPhones running the latest iOS versions, you can silence unknown or suspicious callers automatically, preventing interruptions from strangers or fraudsters.

Another crucial but often overlooked aspect of protection is keeping your device up to date. Regularly updating your operating system and apps isn’t just about getting new features—it’s essential for fixing security vulnerabilities that could otherwise be exploited by scammers.

Some attacks target specific weaknesses in older system versions.

Real-world example
A user received a scam text shortly after a suspicious call. The message appeared to be from a delivery company, asking them to click a link to reschedule a shipment. Fortunately, their phone’s built-in security system blocked the link, identifying it as malicious. If the device hadn’t been updated, the result could have been very different.

Finally, one of the simplest and most effective security tips is to limit how often you share your phone number online. Posting your number on Facebook, LinkedIn, classifieds sites, or online marketplaces increases the chances of it being scraped by bots or sold to spammers or scam networks.

When possible, use temporary phone numbers or anonymizing services—especially when signing up for unfamiliar websites or posting public ads.

Another smart move is to review your social media privacy settings. For example, on Facebook, you can turn off the option to be found using your phone number. This small change can greatly reduce your exposure to unwanted contact.

In summary, to better protect yourself from suspicious calls, you should:

  • Use caller ID and spam-blocking apps
  • Activate your smartphone’s built-in security features
  • Keep your OS and apps up to date
  • Limit sharing your phone number online
  • Adjust your privacy settings on social media platforms

With a bit of caution and the right digital tools, you can build a strong, active barrier against phone scams and fraud attempts.

Awareness is your best defense

As with most cyber security threats, awareness is your most powerful tool. Knowing what to look out for when receiving suspicious calls and how to react can be the difference between staying safe and becoming a victim.

Educating yourself and those around you—especially the elderly, who are often targeted—is key to building a stronger and more secure digital community.


Questions and answers

  1. What are suspicious calls?
    They are unwanted calls from unknown numbers trying to scam or gather your data.
  2. How do I know if a call is a scam?
    Watch for urgency, unexpected prizes, or requests for sensitive info.
  3. Can they steal info just by answering?
    Yes, even confirming your identity can be used in future scams.
  4. Should I block suspicious numbers?
    Yes, and also report them using available tools or apps.
  5. Do call-blocking apps really work?
    Yes, they help detect and stop known spam or scam calls.
  6. What if I gave a scammer personal info?
    Contact your bank and report the incident immediately.
  7. What happens if I click a link after a suspicious call?
    You might install malware or land on a fraudulent website. Avoid clicking.
  8. Why do strange numbers keep calling me?
    Your number may have been sold or added to spam call lists.
  9. Can I report a suspicious call?
    Yes, to the local authorities or online scam-reporting platforms.
  10. Are children and the elderly more vulnerable?
    Yes, they may lack awareness. It’s crucial to educate them.
To top