{"id":15603,"date":"2025-10-28T13:48:15","date_gmt":"2025-10-28T18:48:15","guid":{"rendered":"https:\/\/uwm.edu\/information-technology\/?p=15603"},"modified":"2025-10-28T13:48:17","modified_gmt":"2025-10-28T18:48:17","slug":"watch-out-for-spam-texts-and-calls","status":"publish","type":"post","link":"https:\/\/uwm.edu\/information-technology\/watch-out-for-spam-texts-and-calls\/","title":{"rendered":"Watch out for Spam Texts and Calls"},"content":{"rendered":"\n<p>Spam texts, known as smishing, and spam phone calls, known as vishing, are tactics used by scammers to trick you into sharing personal information or opening malicious links.<\/p>\n\n\n\n<p>Here are some signs of spam texts and calls:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Unknown or suspicious numbers<\/li>\n\n\n\n<li>Urgent language<\/li>\n\n\n\n<li>Requests for personal or financial information<\/li>\n\n\n\n<li>Requests for payment<\/li>\n\n\n\n<li>Links that look unusual<\/li>\n<\/ul>\n\n\n\n<p>If you receive a suspicious text or call, don\u2019t respond, click links, or share any personal details. Instead, delete the message, or hang up. You may also be able to block the phone number or report the message as spam through your phone\u2019s settings.<\/p>\n\n\n\n<p>For more information about staying safe from scams, visit our <a href=\"https:\/\/uwm.edu\/information-technology\/cybersecurity\/\">Cybersecurity webpage<\/a>.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spam texts, known as smishing, and spam phone calls, known as vishing, are tactics used by scammers to trick you into sharing personal information or opening malicious links. Here are some signs of spam texts and calls: If you receive &hellip;<\/p>\n","protected":false},"author":245,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"categories":[8],"tags":[],"class_list":["post-15603","post","type-post","status-publish","format-standard","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Technology Resources<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/information-technology\/watch-out-for-spam-texts-and-calls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Watch out for Spam Texts and Calls\" \/>\n<meta property=\"og:description\" content=\"Spam texts, known as smishing, and spam phone calls, known as vishing, are tactics used by scammers to trick you into sharing personal information or opening malicious links. Here are some signs of spam texts and calls: If you receive &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/information-technology\/watch-out-for-spam-texts-and-calls\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology Resources\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-28T18:48:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-28T18:48:17+00:00\" \/>\n<meta name=\"author\" content=\"Therese E Bohn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@UWM_IT\" \/>\n<meta name=\"twitter:site\" content=\"@UWM_IT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Therese E Bohn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/watch-out-for-spam-texts-and-calls\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/watch-out-for-spam-texts-and-calls\\\/\"},\"author\":{\"name\":\"Therese E Bohn\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#\\\/schema\\\/person\\\/a03e99d3d1a6968b82c734cf9d0a14bf\"},\"headline\":\"Watch out for Spam Texts and Calls\",\"datePublished\":\"2025-10-28T18:48:15+00:00\",\"dateModified\":\"2025-10-28T18:48:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/watch-out-for-spam-texts-and-calls\\\/\"},\"wordCount\":121,\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/watch-out-for-spam-texts-and-calls\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/watch-out-for-spam-texts-and-calls\\\/\",\"name\":\"Watch out for Spam Texts and Calls - Technology Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\"},\"datePublished\":\"2025-10-28T18:48:15+00:00\",\"dateModified\":\"2025-10-28T18:48:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#\\\/schema\\\/person\\\/a03e99d3d1a6968b82c734cf9d0a14bf\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/watch-out-for-spam-texts-and-calls\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/watch-out-for-spam-texts-and-calls\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/watch-out-for-spam-texts-and-calls\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Watch out for Spam Texts and Calls\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\",\"name\":\"Technology Resources\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#\\\/schema\\\/person\\\/a03e99d3d1a6968b82c734cf9d0a14bf\",\"name\":\"Therese E Bohn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6017096b7646fa995267f05109dfb4dbf4615d0405c182e3115a81df61c871cb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6017096b7646fa995267f05109dfb4dbf4615d0405c182e3115a81df61c871cb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6017096b7646fa995267f05109dfb4dbf4615d0405c182e3115a81df61c871cb?s=96&d=mm&r=g\",\"caption\":\"Therese E Bohn\"},\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/author\\\/tbohnuwm-edu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Technology Resources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/information-technology\/watch-out-for-spam-texts-and-calls\/","og_locale":"en_US","og_type":"article","og_title":"Watch out for Spam Texts and Calls","og_description":"Spam texts, known as smishing, and spam phone calls, known as vishing, are tactics used by scammers to trick you into sharing personal information or opening malicious links. Here are some signs of spam texts and calls: If you receive &hellip;","og_url":"https:\/\/uwm.edu\/information-technology\/watch-out-for-spam-texts-and-calls\/","og_site_name":"Technology Resources","article_published_time":"2025-10-28T18:48:15+00:00","article_modified_time":"2025-10-28T18:48:17+00:00","author":"Therese E Bohn","twitter_card":"summary_large_image","twitter_creator":"@UWM_IT","twitter_site":"@UWM_IT","twitter_misc":{"Written by":"Therese E Bohn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uwm.edu\/information-technology\/watch-out-for-spam-texts-and-calls\/#article","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/watch-out-for-spam-texts-and-calls\/"},"author":{"name":"Therese E Bohn","@id":"https:\/\/uwm.edu\/information-technology\/#\/schema\/person\/a03e99d3d1a6968b82c734cf9d0a14bf"},"headline":"Watch out for Spam Texts and Calls","datePublished":"2025-10-28T18:48:15+00:00","dateModified":"2025-10-28T18:48:17+00:00","mainEntityOfPage":{"@id":"https:\/\/uwm.edu\/information-technology\/watch-out-for-spam-texts-and-calls\/"},"wordCount":121,"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/uwm.edu\/information-technology\/watch-out-for-spam-texts-and-calls\/","url":"https:\/\/uwm.edu\/information-technology\/watch-out-for-spam-texts-and-calls\/","name":"Watch out for Spam Texts and Calls - Technology Resources","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/#website"},"datePublished":"2025-10-28T18:48:15+00:00","dateModified":"2025-10-28T18:48:17+00:00","author":{"@id":"https:\/\/uwm.edu\/information-technology\/#\/schema\/person\/a03e99d3d1a6968b82c734cf9d0a14bf"},"breadcrumb":{"@id":"https:\/\/uwm.edu\/information-technology\/watch-out-for-spam-texts-and-calls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/information-technology\/watch-out-for-spam-texts-and-calls\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/information-technology\/watch-out-for-spam-texts-and-calls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/information-technology\/"},{"@type":"ListItem","position":2,"name":"Watch out for Spam Texts and Calls"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/information-technology\/#website","url":"https:\/\/uwm.edu\/information-technology\/","name":"Technology Resources","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/uwm.edu\/information-technology\/#\/schema\/person\/a03e99d3d1a6968b82c734cf9d0a14bf","name":"Therese E Bohn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6017096b7646fa995267f05109dfb4dbf4615d0405c182e3115a81df61c871cb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6017096b7646fa995267f05109dfb4dbf4615d0405c182e3115a81df61c871cb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6017096b7646fa995267f05109dfb4dbf4615d0405c182e3115a81df61c871cb?s=96&d=mm&r=g","caption":"Therese E Bohn"},"url":"https:\/\/uwm.edu\/information-technology\/author\/tbohnuwm-edu\/"}]}},"acf":[],"meta_fields":{"_edit_lock":["1761677342:245"],"_edit_last":["245"],"_yoast_indexnow_last_ping":["1761677298"],"feat_img_video":[""],"feat_img_gallery":[""],"feat_img_caption":["feat-img-caption-on"],"breadcrumbs_display":["breadcrumbs-on"],"otp_nav_display":["otp-on-mobile"],"post_layout":["post-layout-theme"],"_yoast_wpseo_primary_category":["28"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_inclusive_language_score":["90"],"_yoast_wpseo_focuskeywords":[""],"_yoast_wpseo_keywordsynonyms":[""],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"_uwm_wg_content_review_log":["a:1:{i:0;a:5:{s:11:\"reviewer_id\";i:0;s:6:\"status\";s:5:\"reset\";s:10:\"entry_date\";s:19:\"2026-03-01 02:13:53\";s:16:\"priority_content\";s:0:\"\";s:4:\"note\";s:43:\"Content review reset at start of new cycle.\";}}"]},"publishpress_future_action":{"enabled":false,"date":"2026-04-24 02:53:52","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/15603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/users\/245"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=15603"}],"version-history":[{"count":1,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/15603\/revisions"}],"predecessor-version":[{"id":15604,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/15603\/revisions\/15604"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=15603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/categories?post=15603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/tags?post=15603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}