If you are targeted they can get the number of your contacts by using OSI or other methods. But in most cases it is just a coincidence that it looks like that that someone you know is calling. All that said, if the call is coming from your contact named uncle Joe and some guy with a strange accent saying they are calling from Microsoft, you will know it is a scam.
What are you referring to by “OSI”? Not the 7 layer model, but that’s all I can find. It’s good to explain abbreviations when they’re not the most common usage of that abbreviation.
If they don’t have my contacts, they can’t spoof a number from my contacts. If they just spoof local numbers, the chance of them choosing one of my contacts is incredibly slim.
And how does a scammer get my contacts?
If you are targeted they can get the number of your contacts by using OSI or other methods. But in most cases it is just a coincidence that it looks like that that someone you know is calling. All that said, if the call is coming from your contact named uncle Joe and some guy with a strange accent saying they are calling from Microsoft, you will know it is a scam.
What are you referring to by “OSI”? Not the 7 layer model, but that’s all I can find. It’s good to explain abbreviations when they’re not the most common usage of that abbreviation.
If they don’t have my contacts, they can’t spoof a number from my contacts. If they just spoof local numbers, the chance of them choosing one of my contacts is incredibly slim.