the first month of the year has passed. We’re very happy that all of our users have contributed to our platform by sharing useful information of various telephone numbers. Last month, we received more than 1200 ratings and comments in UK. The total number has increased by 200 ratings compared to December. In order to protect you from possible fraudsters and phone spammers, we would like to share some of the most searched numbers at tellows.co.uk. We’ve also added the type of callers and the name of companies, so you can see if the numbers are dangerous or not. Continue reading →
tellows database consists of over millions of telephone numbers reported by our users worldwide. As you can read on our API page, we are always open for any collaboration and partnership by offering the access to our database. Recently, we made a collaboration with Ever Apps LLC to support its anti spam call app for iPhone with the tellows database. In case you haven’t heard of this application, here’s a quick overview of our new partner app!
we, the tellows team, sincerely wish you a happy new year!
Thanks to you and your endless support we could reach our goals and grow even more in 2018. From the new features of the tellows app to our new and fresh homepage design, we will tell you all the important news in the following annual review. Check it out! Continue reading →
Have you ever wondered which country actually has more comments than your current country? Or how many comments are written on average in your country?
To answer these questions, we conducted a study on how many comments are written on tellows in individual countries regarding the page views and we discovered some interesting facts from the study.
tellows is currently available in 50 countries. For the study, we concentrated on the 17 most important tellows countries. Continue reading →
October has always been the European cybersecurity month for the past six years. The European Commission and the European Union Agency for Network and Information Security (ENISA) arranged the occasion to raise awareness of cybersecurity and to provide users the opportunities to protect themselves from cyber-criminals. The focus of the campaign is to give users some useful tips and tricks to prevent themselves from being a victim of cyber scams. These include phishing, smishing, and vishing. In case you haven’t heard of these scams, we have collected information about these types of scams below. Check it out!
as you might remember, we have posted an article about fake technical support scam in the beginning of last August to warn you of the rising issue of a Microsoft scam. Microsoft has also released several statements on their official website to warn people about this fraud. Unfortunately, this doesn’t stop scammers from finding other ways to trick people.
Recently, we found out that many fake tech support scammers have been using another method to deceive Microsoft users. They take advantage of Microsoft TechNet portals and created over 3000 fake pages. The TechNet portal is usually used by Microsoft users to save documentations of products and images as well as to offer community forums for its users. Unfortunately, the scammers have found a way to use the subdomain of TechNet portal, gallery.technet.microsoft.com, in order to be displayed on Google. Although the pages are usually blank pages with error message, the scammers’ purpose is to display their phone numbers on the headline of the pages. They mostly affiliate the tech support with Bitcoin or Coinbase Helpdesk. The problem has gotten bigger, as the fraudsters were able to rank quite high on google search and their fake pages were displayed on the first page when the users search for keywords such as “Helpdesk Microsoft”, “Helpdesk Coinbase”, etc. Continue reading →
lately we have been seeing many reports in our tellows community regarding fraudsters claiming to be computer tech support. These fraudsters used the most classic trick: they claimed to be from a well-known company such as Microsoft and told us that our computer had been infected or hacked. In order to fix the computer problem and prevent the virus from damaging the computer any further, they offered “assistance”. If we had agreed to this, they would give us some instructions we must follow. Usually, we would be asked to visit certain websites and enter our personal data there. Some fraudsters could even hack the computer and show a pop-up window to ensure us that our computer had indeed been infected by some viruses. In the end, they would either try to steal our personal bank data through the access we gave or charge us for the costs of fixing the non-existent computer issue. Continue reading →