By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: We will increasingly see more “verified” SMS against fraud. The important thing is to understand how they really work
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > We will increasingly see more “verified” SMS against fraud. The important thing is to understand how they really work
Mobile

We will increasingly see more “verified” SMS against fraud. The important thing is to understand how they really work

News Room
Last updated: 2026/01/15 at 8:28 PM
News Room Published 15 January 2026
Share
We will increasingly see more “verified” SMS against fraud. The important thing is to understand how they really work
SHARE

We live watching our cell phones and what appears on their screen, from a notice from the bank to a code to authorize a payment. This dependency has turned the text message into fertile ground for deception, with campaigns of smishing that imitate well-known companies and sneak into conversations that seem legitimate. The problem is not only technical, it is trust: distinguishing at a glance who is really on the other side.

For years, SMS has treated legitimate and fraudulent messages equally, and that neutrality is exactly what attackers exploit. Malicious campaigns detected in Spain show how names and formats of known entities are copied to gain the trust of the recipient. These messages are designed not to raise suspicion. And often, when doubt arises, it is too late to react.

Say ‘hello’ to verified messages. Faced with the erosion of trust in traditional SMS, the industry has chosen to reinforce the identity of the sender instead of placing all responsibility on the user. Verified messages introduce a relevant change: they make visible whether a company has been recognized as legitimate before the message reaches the mobile. Supported by the RCS protocol, these messages add a name, logo and verification indicators with the intention of reducing one of the main weapons of fraud, confusion about the real origin of the message.

BBVA. This is how it looks on mobile. In Spain, BBVA has been one of the first large banks to show this change visibly for the user. On Android, the bank’s official messages are identified with its name and logo, accompanied by an indicator that indicates them as an official channel. By clicking on that logo, the user can verify that the associated data, such as the telephone number or website, match those of the bank. Furthermore, these communications arrive in a different thread than traditional SMS, precisely to prevent them from being mixed with fraudulent messages.

Bbva

Bankinter has also taken the leap. Bankinter has partnered with Telefónica to distribute verified messages. The entity explains that this will improve the security of “critical communications”, such as single-use codes for transfers or online payments. Here we will also find the sender verification confirmation, the official logo and additional information such as the website and a telephone number.

Png Binkinter
Png Binkinter

How verification works. Behind that visible badge there is a process much less obvious to the user. The standard defined by the GSMA establishes several previous stages before a company can send a single verified message. First, the entity must register its identity, with a specific name and logo, and submit it to external certification by a third party that validates that the entity can use that name and logo. This validation is not enough on its own: the authority that issues it must be included in the trusted list of the recipient’s operator. Without that complete string, the check simply doesn’t show.

Who verifies who. Here the so-called Verification Authorities come into play as third parties in charge of validating that a company is who it says it is before it can send verified messages. That role may fall to private companies specialized in digital verification, mobile operators or even government entities, depending on the deployment and the country. Afterwards, it is the user’s operator who decides whether they trust that authority, something that is sometimes reflected visibly in the message itself, as occurs in an official Bankinter example, where the system indicates that the verification has been carried out by Movistar.

The final verification occurs when the message reaches the phone. According to the GSMA standard, the messaging app automatically downloads the sender’s profile and runs a series of technical checks before displaying any badge. It is checked that the signature is still valid, that the authority that issued it is accepted by the user’s operator and that the data has not been altered. Only if everything fits does the verification indicator appear; If something fails, the message loses that appearance of legitimacy.

Does it work on iOS and Android? This scheme is not exclusive to Android. Apple added support for RCS as a carrier service starting with iOS 18, allowing you to send and receive messages with advanced features when not using iMessage. In practice, the behavior is the same: if the operator supports RCS and the standard is implemented, the system can display the name, logo and indicators associated with the sender. Without this support from the operator, the message returns to the familiar terrain of SMS or MMS, without additional verification signals.

How often should we change ALL our passwords according to three cybersecurity experts

For the user, the practical learning is simple: a verified message offers more context and more clues than a conventional SMS, but it does not eliminate the need to remain cautious. Knowing that there is a technical process behind that distinction helps us better interpret what reaches our mobile phones and be wary when something does not match. However, in an environment where malicious actors never sleep, caution remains essential.

Images | Vitaly Gariev | BBVA | Bankinter | Gemini 3 Pro

In WorldOfSoftware | Cybersecurity experts by day, cybercriminals by night: how two professionals fell after using ransomware

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Durham Workers’ Compensation Lawyers: Protecting Rights Durham Workers’ Compensation Lawyers: Protecting Rights
Next Article how Disney+ approaches the year 2026 how Disney+ approaches the year 2026
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Geely’s Lynk & Co laucnhes first all-electric SUV in European expansion · TechNode
Geely’s Lynk & Co laucnhes first all-electric SUV in European expansion · TechNode
Computing
We need grocery stores, pharmacies more than a quantum campus, Southeast Siders say
We need grocery stores, pharmacies more than a quantum campus, Southeast Siders say
News
Cyber body ISC2 signs on as UK software security ambassador | Computer Weekly
Cyber body ISC2 signs on as UK software security ambassador | Computer Weekly
News
CES 2025: Chinese tech giants shine with rollable PCs and AI TVs · TechNode
CES 2025: Chinese tech giants shine with rollable PCs and AI TVs · TechNode
Computing

You Might also Like

China announces advances in fusion energy with its artificial sun
Mobile

China announces advances in fusion energy with its artificial sun

4 Min Read
how Disney+ approaches the year 2026
Mobile

how Disney+ approaches the year 2026

10 Min Read
We launch Orbital Vision 2026 – MuyComputerPRO
Mobile

We launch Orbital Vision 2026 – MuyComputerPRO

5 Min Read
iQOO Z11 Turbo Debuts With 144Hz Display, 200MP Camera, And 7,600mAh Battery: Price, Specs
Mobile

iQOO Z11 Turbo Debuts With 144Hz Display, 200MP Camera, And 7,600mAh Battery: Price, Specs

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?