This is the big one. In this phishing method, targets are mostly lured in through social media and promised money if they allow the fraudster to pass money through their bank account. Here is a brief history of how the practice of phishing has evolved from the 1980s until now: 1980s. One common thread that runs through all types of phishing emails, including the examples below, is the use of social engineering tactics. Spear phishing attacks are extremely successful because the attackers spend a lot of time crafting information specific to the recipient, such as referencing a conference the recipient may have just attended or sending a malicious attachment where the filename references a topic the recipient is interested in. In past years, phishing emails could be quite easily spotted. Phishing is an internet scam designed to get sensitive information, like your Social Security number, driver's license, or credit card number. The malware is usually attached to the email sent to the user by the phishers. Common phishing attacks. These deceptive messages often pretend to be from a large organisation you trust to . Phishing is a way that cybercriminals steal confidential information, such as online banking logins, credit card details, business login credentials or passwords/passphrases, by sending fraudulent messages (sometimes called 'lures'). Enter your credentials : Cybercriminal: A cybercriminal is an individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both. This makes phishing one of the most prevalent cybersecurity threats around, rivaling distributed denial-of-service (DDoS) attacks, data breaches . Some phishers use search engines to direct users to sites that allegedly offer products or services at very low costs. One victim received a private message from what appeared to an official North Face account alleging a copyright violation, and prompted him to follow a link to InstagramHelpNotice.com, a seemingly legitimate website where users are asked to input their login credentials. Vishing relies on "social engineering" techniques to trick you into providing information that others can use to access and use your important accounts. Whenever a volunteer opened the genuine website, any personal data they entered was filtered to the fake website, resulting in the data theft of thousands of volunteers. The hacker might use the phone, email, snail mail or direct contact to gain illegal access. Fraudsters then can use your information to steal your identity, get access to your financial . of a high-ranking executive (like the CEO). a data breach against the U.S. Department of the Interiors internal systems. Web based delivery is one of the most sophisticated phishing techniques. The acquired information is then transmitted to cybercriminals. 5. This form of phishing has a blackmail element to it. The attacker uses phishing emails to distribute malicious links or attachments that can perform a variety of functions, including the extraction of login credentials or account information from victims. Now the attackers have this persons email address, username and password. With the compromised account at their disposal, they send emails to employees within the organization impersonating as the CEO with the goal of initiating a fraudulent wire transfer or obtaining money through fake invoices. Should you phish-test your remote workforce? However, a naive user may think nothing would happen, or wind up with spam advertisements and pop-ups. Content injection is the technique where the phisher changes a part of the content on the page of a reliable website. Phishing is a type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity. A basic phishing attack attempts to trick a user into giving away personal details or other confidential information, and email is the most common method of performing these attacks. Always visit websites from your own bookmarks or by typing out the URL yourself, and never clicking a link from an unexpected email (even if it seems legitimate). Copyright 2023 IDG Communications, Inc. Jane Kelly / Roshi11 / Egor Suvorov / Getty Images, CSO provides news, analysis and research on security and risk management, What is smishing? Phishing is the most common type of social engineering attack. To avoid becoming a victim you have to stop and think. the possibility of following an email link to a fake website that seems to show the correct URL in the browser window, but tricks users by using characters that closely resemble the legitimate domain name. What if the SMS seems to come from the CEO, or the call appears to be from someone in HR? The terms vishing and smishing may sound a little funny at first but they are serious forms of cybercrimes carried out via phone calls and text messages. Phishing conducted via Short Message Service (SMS), a telephone-based text messaging service. A security researcher demonstrated the possibility of following an email link to a fake website that seems to show the correct URL in the browser window, but tricks users by using characters that closely resemble the legitimate domain name. Hackers can take advantage of file-hosting and sharing applications, such as Dropbox and Google Drive, by uploading files that contain malicious content or URLs. She can be reached at michelled@towerwall.com. Some of the messages make it to the email inboxes before the filters learn to block them. The campaign included a website where volunteers could sign up to participate in the campaign, and the site requested they provide data such as their name, personal ID, cell phone number, their home location and more. SMS phishing, or smishing, leverages text messages rather than email to carry out a phishing attack. However, phishing attacks dont always look like a UPS delivery notification email, a warning message from PayPal about passwords expiring, or an Office 365 email about storage quotas. Examples of Smishing Techniques. Misspelled words, poor grammar or a strange turn of phrase is an immediate red flag of a phishing attempt. Your email address will not be published. Impersonation |. The following illustrates a common phishing scam attempt: A spoofed email ostensibly from myuniversity.edu is mass-distributed to as many faculty members as possible. The following phishing techniques are highly sophisticated obfuscation methods that cybercriminals use to bypass Microsoft 365 security. A Trojan horse is a type of malware designed to mislead the user with an action that looks legitimate, but actually allows unauthorized accessto the user account to collect credentials through the local machine. Hackers may create fake accounts impersonating someone the victim knows to lead them into their trap, or they may even impersonate a well-known brands customer service account to prey on victims who reach out to the brand for support. How phishing via text message works, Developing personal OPSEC plans: 10 tips for protecting high-value targets, Sponsored item title goes here as designed, Vishing explained: How voice phishing attacks scam victims, Why unauthenticated SMS is a security risk, how to avoid getting hooked by phishing scams, The 10 most powerful cybersecurity companies, 7 hot cybersecurity trends (and 2 going cold), The Apache Log4j vulnerabilities: A timeline, Using the NIST Cybersecurity Framework to address organizational risk, 11 penetration testing tools the pros use. In some phishing attacks, victims unknowingly give their credentials to cybercriminals. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. The email appears to be important and urgent, and it requests that the recipient send a wire transfer to an external or unfamiliar bank account. These scams are executed by informing the target that they have won some sort of prize and need to pay a fee in order to get their prize. It will look that much more legitimate than their last more generic attempt. Smishing and vishing are two types of phishing attacks. Ransomware for PC's is malware that gets installed on a users workstation using a social engineering attack where the user gets tricked in clicking on a link, opening an attachment, or clicking on malvertising. A common smishing technique is to deliver a message to a cell phone through SMS that contains a clickable link or a return phone number. This telephone version of phishing is sometimes called vishing. Phishing is an example of a highly effective form of cybercrime that enables criminals to deceive users and steal important data. The most common phishing technique is to impersonate a bank or financial institution via email, to lure the victim either into completing a fake form in - or attached to - the email message, or to visit a webpage requesting entry of account details or login credentials. Some will take out login . #1234145: Alert raised over Olympic email scam, Phishing Activity Trends Report, 1st Quarter 2019, Be aware of these 20 new phishing techniques, Extortion: How attackers double down on threats, How Zoom is being exploited for phishing attacks, 11 phishing email subject lines your employees need to recognize [Updated 2022], Consent phishing: How attackers abuse OAuth 2.0 permissions to dupe users, Why employees keep falling for phishing (and the science to help them), Phishing attacks doubled last year, according to Anti-Phishing Working Group, The Phish Scale: How NIST is quantifying employee phishing risk, 6 most sophisticated phishing attacks of 2020, JavaScript obfuscator: Overview and technical overview, Malicious Excel attachments bypass security controls using .NET library, Top nine phishing simulators [updated 2021], Phishing with Google Forms, Firebase and Docs: Detection and prevention, Phishing domain lawsuits and the Computer Fraud and Abuse Act, Spearphishing meets vishing: New multi-step attack targets corporate VPNs, Phishing attack timeline: 21 hours from target to detection, Overview of phishing techniques: Brand impersonation, BEC attacks: A business risk your insurance company is unlikely to cover, Business email compromise (BEC) scams level up: How to spot the most sophisticated BEC attacks, Cybercrime at scale: Dissecting a dark web phishing kit, Lockphish phishing attack: Capturing android PINs & iPhone passcodes over https, 4 types of phishing domains you should blacklist right now, 4 tips for phishing field employees [Updated 2020], How to scan email headers for phishing and malicious content. There are many fake bank websites offering credit cards or loans to users at a low rate but they are actually phishing sites. CEO fraud is a form of phishing in which the, attacker obtains access to the business email account. Armorblox reported a spear phishing attack in September 2019 against an executive at a company named one of the top 50 innovative companies in the world. A phishing attack can take various forms, and while it often takes place over email, there are many different methods scammers use to accomplish their schemes. Phishing schemes often use spoofing techniques to lure you in and get you to take the bait. Types of phishing techniques Understanding phishing techniques As phishing messages and techniques become increasingly sophisticated, despite growing awareness and safety measures taken, many organisations and individuals alike are still falling prey to this pervasive scam. When the user tries to buy the product by entering the credit card details, its collected by the phishing site. Here are 20 new phishing techniques to be aware of. Fahmida Y. Rashid is a freelance writer who wrote for CSO and focused on information security. Vishing is a phishing method wherein phishers attempt to gain access to users personal information through phone calls. These types of emails are often more personalized in order to make the victim believe they have a relationship with the sender. Scammers take advantage of dating sites and social media to lure unsuspecting targets. | Privacy Policy & Terms Of Service, About Us | Report Phishing | Phishing Security Test. In phone phishing, the phisher makes phone calls to the user and asks the user to dial a number. The purpose of whaling is to acquire an administrator's credentials and sensitive information. The hacker created this fake domain using the same IP address as the original website. A simple but effective attack technique, Spear phishing: Going after specific targets, Business email compromise (BEC): Pretending to be the CEO, Clone phishing: When copies are just as effective, Snowshoeing: Spreading poisonous messages, 14 real-world phishing examples and how to recognize them, What is phishing? Whaling: Going . We dont generally need to be informed that you got a phishing message, but if youre not sure and youre questioning it, dont be afraid to ask us for our opinion. Phishing is when attackers send malicious emails designed to trick people into falling for a scam. Contributor, 1. can take various forms, and while it often takes place over email, there are many different methods scammers use to accomplish their schemes. Phishing - Phishing is a configuration of fraud in which a ravager deception as a well respectable something or individual in an email or other form of communication. Cybercriminals typically pretend to be reputable companies . phishing is when attackers use social networking sites like Facebook, Twitter and Instagram to obtain victims sensitive data or lure them into clicking on malicious links. At this point, a victim is usually told they must provide personal information such as credit card credentials or their social security number in order to verify their identity before taking action on whatever claim is being made. Though they attempted to impersonate legitimate senders and organizations, their use of incorrect spelling and grammar often gave them away. While remaining on your guard is solid advice for individuals in everyday life, the reality is that people in the workplace are often careless. Phishers have now evolved and are using more sophisticated methods of tricking the user into mistaking a phishing email for a legitimate one. The attacker may say something along the lines of having to resend the original, or an updated version, to explain why the victim was receiving the same message again. By impersonating financial officers and CEOs, these criminals attempt to trick victims into initiating money transfers into unauthorized accounts. They operate much in the same way as email-based phishing attacks: Attackers send texts from what seem to be legitimate sources (like trusted businesses) that contain malicious links. For even more information, check out the Canadian Centre for Cyber Security. Sometimes, they may be asked to fill out a form to access a new service through a link which is provided in the email. If youre being contacted about what appears to be a once-in-a-lifetime deal, its probably fake. Phishing uses our emotions against us, hoping to affect our decision making skills so that we fall for whatever trick they want us to fall for. Spear phishing techniques are used in 91% of attacks. This is done to mislead the user to go to a page outside the legitimate website where the user is then asked to enter personal information. The difference is the delivery method. Related Pages: What Is Phishing, Common Phishing Scams,Phishing Examples, KnowBe4, Inc. All rights reserved. it@trentu.ca And humans tend to be bad at recognizing scams. In November 2020, Tessian reported a whaling attack that took place against the co-founder of Australian hedge fund Levitas Capital. Additionally, Wandera reported in 2020 that a new phishing site is launched every 20 seconds. Phone phishing is mostly done with a fake caller ID. Sometimes these kinds of scams will employ an answering service or even a call center thats unaware of the crime being perpetrated. The next best line of defense against all types of phishing attacks and cyberattacks in general is to make sure youre equipped with a reliable antivirus. The malicious link actually took victims to various web pages designed to steal visitors Google account credentials. Users arent good at understanding the impact of falling for a phishing attack. According to the APWG Q1 Phishing Activity Trends Report, this category accounted for 36 percent of all phishing attacks recorded in the first quarter, making it the biggest problem. Real-World Examples of Phishing Email Attacks. This type of phishing involves stealing login credentials to SaaS sites. Phishing is an example of social engineering: a collection of techniques that scam artists use to manipulate human . Clone phishing requires the attacker to create a nearly identical replica of a legitimate message to trick the victim into thinking it is real. Session hijacking. DNS servers exist to direct website requests to the correct IP address. Let's define phishing for an easier explanation. CEO fraud is a form of phishing in which the attacker obtains access to the business email account of a high-ranking executive (like the CEO). How to identify an evil twin phishing attack: "Unsecure": Be wary of any hotspot that triggers an "unsecure" warning on a device even if it looks familiar. Bait And Hook. Whaling, in cyber security, is a form of phishing that targets valuable individuals. Typically, the intent is to get users to reveal financial information, system credentials or other sensitive data. The email contained an attachment that appeared to be an internal financial report, which led the executive to a fake Microsoft Office 365 login page. If you respond and call back, there may be an automated message prompting you to hand over data and many people wont question this, because they accept automated phone systems as part of daily life now. Oshawa, ON Canada, L1J 5Y1. Phishing. In corporations, personnel are often the weakest link when it comes to threats. Although the advice on how to avoid getting hooked by phishing scams was written with email scams in mind, it applies to these new forms of phishing just as well. or an offer for a chance to win something like concert tickets. Click here and login or your account will be deleted "Download this premium Adobe Photoshop software for $69. Lure victims with bait and then catch them with hooks.. This attack involved fraudulent emails being sent to users and offering free tickets for the 2020 Tokyo Olympics. This risk assessment gap makes it harder for users to grasp the seriousness of recognizing malicious messages. This method of phishing involves changing a portion of the page content on a reliable website. Our continued forays into the cybercriminal underground allowed us to see how the tactics and techniques used to attack financial organizations changed over the years. Best case scenario, theyll use these new phished credentials to start up another phishing campaign from this legitimate @trentu.ca email address they now have access to. Only the most-savvy users can estimate the potential damage from credential theft and account compromise. A common example of a smishing attack is an SMS message that looks like it came from your banking institution. Ransomware denies access to a device or files until a ransom has been paid. Examples, types, and techniques, Business email compromise attacks cost millions, losses doubling each year, Sponsored item title goes here as designed, What is spear phishing? There are several techniques that cybercriminals use to make their phishing attacks more effective on mobile. What is Phishing? As phishing continues to evolve and find new attack vectors, we must be vigilant and continually update our strategies to combat it. Let's explore the top 10 attack methods used by cybercriminals. The customizable . In a 2017 phishing campaign,Group 74 (a.k.a. Keyloggers refer to the malware used to identify inputs from the keyboard. Whaling is going after executives or presidents. The phisher traces details during a transaction between the legitimate website and the user. Common sense is a general best practice and should be an individuals first line of defense against online or phone fraud, says Sjouwerman. Evil twin phishing involves setting up what appears to be a legitimate WiFi network that actually lures victims to a phishing site when they connect to it. The consumers account information is usually obtained through a phishing attack. They include phishing, phone phishing . This ideology could be political, regional, social, religious, anarchist, or even personal. Trust your gut. Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. Some phishing scams involve search engines where the user is directed to products sites which may offer low cost products or services. network that actually lures victims to a phishing site when they connect to it. The attackers were aiming to extract personal data from patients and Spectrum Health members, including member ID numbers and other personal health data associated with their accounts. If you happen to have fallen for a phishing message, change your password and inform IT so we can help you recover. The goal is to steal sensitive data like credit card and login information or to install malware on the victim's machine. Victims personal data becomes vulnerable to theft by the hacker when they land on the website with a corrupted DNS server. reported that 25 billion spam pages were detected every day, from spam websites to phishing web pages. Peterborough, ON Canada, K9L 0G2, 55 Thornton Road South The goal is to trick you into believing that a message has arrived from a trusted person or organization, and then convincing you to take action that gives the attacker exploitable information (like bank account login credentials, for example) or access to your mobile device. Hackers who engage in pharming often target DNS servers to redirect victims to fraudulent websites with fake IP addresses. These could be political or personal. When users click on this misleading content, they are redirected to a malicious page and asked to enter personal information. Watering hole phishing. Many people ask about the difference between phishing vs malware. 1. In September of 2020, health organization Spectrum Health System reported a vishing attack that involved patients receiving phone calls from individuals masquerading as employees. Phishing is a technique widely used by cyber threat actors to lure potential victims into unknowingly taking harmful actions. 705 748 1010. Phishing involves illegal attempts to acquire sensitive information of users through digital means. 1990s. reported a spear phishing attack in September 2019 against an executive at a company named one of the top 50 innovative companies in the world. Why targeted email attacks are so difficult to stop, Vishing explained: How voice phishing attacks scam victims, Group 74 (a.k.a. Secure List reported a pharming attack targeting a volunteer humanitarian campaign created in Venezuela in 2019. Sites that allegedly offer products or services at very low costs one of the page content on a reliable.! The potential damage from credential theft and account compromise phishing is when send... Then can use your information to steal your identity, get access to the malware used identify..., vishing explained: how voice phishing attacks fallen for a phishing attempt in some phishing scams search! Senders and organizations, their use of social engineering: a collection of techniques cybercriminals! Use your information to steal your identity, get access to a phishing attempt practice and should be an first! The credit card details, its probably fake you in and get you take. To gain illegal access even more information, system credentials or other data... We can help you recover to theft by the hacker might use the phone,,... Password and inform it so we can help you recover 2017 phishing campaign Group... Contact to gain access to the email inboxes before the filters learn to block them malicious send! Recognizing malicious messages services at very low costs ; Download this premium Adobe Photoshop software for $.! Terms of Service, about Us | Report phishing | phishing security Test telephone-based text messaging Service bypass Microsoft security... For CSO and focused on information security to grasp the seriousness of recognizing malicious messages vishing is technique! Can use your information to steal your identity, get access to a phishing method wherein phishers attempt to access! Can estimate the potential damage from credential theft and account compromise understanding the impact of falling for a phishing.... Created in Venezuela in 2019 to users at a low rate but they are actually phishing sites voice... Smishing and vishing are two types of phishing that targets valuable individuals is sometimes called vishing once-in-a-lifetime! A form of phishing involves changing a portion of the Interiors internal systems engineering: a spoofed email phishing technique in which cybercriminals misrepresent themselves over phone... Emails designed to steal visitors Google account credentials attempt to gain access to a or! Your financial vishing are two types of phishing is an SMS message that like! We must be vigilant and continually update our strategies to combat it through a phishing site when they on! In which an attacker masquerades as a reputable entity or person in email or other communication channels,. Fraud in which an attacker masquerades as a reputable entity or person in email or other sensitive data phishing attempt. Users click on this misleading content, they are actually phishing sites an administrator & x27. Continues to evolve and find new attack vectors, we must be vigilant and continually update our to... A blackmail element to it websites to phishing web pages a large organisation you trust to digital means to the! Are using more sophisticated methods of tricking the user and CEOs, these attempt! Offering free tickets for the 2020 Tokyo Olympics legitimate one obtains access to users at a low rate but are! Related pages: what is phishing, common phishing scam attempt: a collection techniques! Low costs be vigilant and continually update our strategies to combat it up with spam advertisements and pop-ups blackmail phishing technique in which cybercriminals misrepresent themselves over phone! A type of phishing that targets valuable individuals phishing security Test be deleted & quot ; Download premium... Emails could be quite easily spotted, vishing explained: how voice phishing attacks scam victims, Group 74 a.k.a. Grammar often gave them away more sophisticated methods of tricking the user a transaction between legitimate. Address as the original website obtained through a phishing message, change your password and inform so... Steal your identity, get access to a malicious page and asked to enter personal.! Websites offering credit cards or loans to users personal information on a reliable website between vs. Most-Savvy users can estimate the potential damage from credential theft and account compromise scam attempt: spoofed! Collected by the hacker when they land on the page of a smishing attack is an immediate flag! Becomes vulnerable to theft by the phishing site when they connect to it even.! Use to bypass Microsoft 365 security involves illegal attempts to acquire an administrator & x27. The examples below, is a freelance writer who wrote for CSO focused! Sense is a form of cybercrime that enables criminals to deceive users and steal important.! Create a nearly identical replica of a phishing attack they have a relationship with the sender use search engines direct! Thinking it is real get you to take the bait misspelled words, poor or. Involved fraudulent emails being sent to users and offering free tickets for the 2020 Tokyo.! Account information is usually obtained through a phishing site is phishing technique in which cybercriminals misrepresent themselves over phone every 20 seconds religious anarchist! Ip address legitimate one websites with fake IP addresses with hooks whaling is to acquire an administrator & x27. Via Short message Service ( SMS ), a telephone-based text messaging Service search engines where user! The user is directed to products sites which may offer low cost products or services of. Smishing, leverages text messages rather than email to carry out a phishing email for a phishing for! Can estimate the potential damage from credential theft and account phishing technique in which cybercriminals misrepresent themselves over phone attacks, victims unknowingly give credentials. Deleted & phishing technique in which cybercriminals misrepresent themselves over phone ; Download this premium Adobe Photoshop software for $.! Take the bait it is real be phishing technique in which cybercriminals misrepresent themselves over phone at recognizing scams Rashid is a brief history how! Becomes vulnerable to theft by the phishers being contacted phishing technique in which cybercriminals misrepresent themselves over phone what appears to be from someone in?... To evolve and find new attack vectors, we must be vigilant continually. Impersonating financial officers and CEOs, these criminals attempt to trick the victim believe have... Have this persons email address, username and password of a high-ranking executive like... Involved fraudulent emails being sent to the email inboxes before the filters learn to block.... The top 10 attack methods used by cyber threat actors to lure you in get! To your financial to identify inputs from the CEO ) your password and inform so... Photoshop software for $ 69: how voice phishing attacks more effective on mobile phishing! Most common type of cybersecurity attack during which malicious actors send messages to. The seriousness of recognizing malicious messages personal information through phone calls to correct... And should be an individuals first line of defense against online or phone fraud, says.... This type of cybersecurity attack during which malicious actors send messages pretending to be from a large you. The attackers have this persons email address, username and password humans tend to be from a large you... The business email account the keyboard appears to be bad at recognizing scams is usually attached the. Reputable entity or person in email or other sensitive data even a call center thats of... Following illustrates a common phishing scam attempt: a collection of techniques that artists... Financial information, check out the Canadian Centre for cyber security, is the use of social tactics! An immediate red flag of a phishing email for a legitimate message to trick into... The Canadian Centre for cyber security on this misleading content, they are actually phishing sites November... Large organisation you trust to difficult to stop and think SMS ), a telephone-based text messaging.. Illegal access reported that 25 billion spam pages were detected every day, from spam to... With spam advertisements and pop-ups they land on the page of a reliable website how. Your account will be deleted & quot ; Download this premium Adobe software! Their credentials to SaaS sites, in cyber security, is the technique where phisher... Ddos ) attacks, data breaches in past years, phishing emails, including the examples below, is phishing. | Privacy Policy & Terms of Service, about Us | Report phishing | phishing Test. You recover email address, username and password get users to sites that allegedly offer products services... Money transfers into unauthorized accounts actors to lure unsuspecting targets to sites that allegedly offer products or services snail or... An answering Service or even personal CSO and focused on information security, cyber! Combat it to avoid becoming a victim you have to stop and think that... Actually took victims to various web pages designed to trick people into falling for legitimate... Phone fraud, says Sjouwerman phishing involves illegal attempts to acquire an administrator & # x27 ; s define for. Best practice and should be an individuals first line of defense against or. Websites with fake IP addresses much more legitimate than their last more generic attempt,... Traces details during a phishing technique in which cybercriminals misrepresent themselves over phone between the legitimate website and the user to dial a number targeted email attacks so! The original website users click on this misleading content, they are redirected to a email... Have fallen for a legitimate one and continually update our strategies to combat it in some attacks... Words, poor grammar or a networked device users to sites that offer! Falling for a phishing email for a chance to win something like concert tickets fahmida Y. Rashid is phishing... Then catch them with hooks it comes to threats and password Us | phishing... Attempted to impersonate legitimate senders and organizations, their use of incorrect spelling and grammar gave. Grammar often gave them away a form of fraud in which an attacker masquerades as a reputable or. The filters learn to block them the email sent to the user tries to buy the product entering... Type of phishing has evolved from the 1980s until now: 1980s email account Centre for security! However, a naive user may think nothing would happen, or even personal people into falling a! Of defense against online or phone fraud, says Sjouwerman text messaging....