Friday, June 05, 2020

3 Basic Social Engineering Attack - How to identify them

Hacking is growing problem and these insanely easy social engineering tactics can result into major security breach. Below tips for users so your business doesn't become the victim of a hacker.

3 Basic Social Engineering Attack

1)In person
2)Phone
3)Digital

In Person Social Engineering Attack

Here are few common tactics used to gain access,gather secure information and plant devices that you should be aware of

Open door: When you leave a door open of your company and someone slips through.

Bar hopping: When someone buys you drinks and extract information from you as you become drunk some people tend to talk more when drinking.

The Cable guy: When someone pretends to be a service technician of some kind(cable,phone,electrician,etc..) to gain access to your business.

Open Access: When someone uses or requests to use your computer for whatever reason and they are left 

Phone Social Engineering Attack

Panic: When someone calls you pretending to be support and provides a frantic scenario that compromises your safety.

Donation: When someone calls you pretending they are someone from a known organization you might be interested in.

Digital Social Engineering Attack

Phishing: When someone publishes a fake website that mimics a brand and services to gain your trust.These websites will request information through forms and offer download containing malware.

Social Media Page: When someone build socialmedia page that mimics a trusted brand.The account will try to publish relevant content that persuades you to click and download a malicious file



1 comment:

  1. How to Check if a Website OR URL is Safe or Not? Cyber security
    🔒🔓

    http://www.urlhelp.xyz/2021/07/how-to-check-if-website-or-url-is-safe.html

    I am from internet data search help service

    https://www.urlhelp.xyz/

    ReplyDelete

Understanding SOC 2 Type 1 vs. Type 2: A Comprehensive Guide

  In today's rapidly evolving digital landscape, organizations are under constant pressure to demonstrate their commitment to security, ...