Social engineering involves deceiving victims into unwittingly disclosing confidential information or pursuing a fraudulent action. Social engineering is often used in phishing schemes. Cybercriminals rely on most people’s natural inclination to be helpful and use this to convince those with network access or other important secret information to disclose it. Looking over someone’s shoulder and quickly memorizing their passwords is one of the most basic tactics, as is dumpster diving, in which garbage is sorted through in order to find information that could be useful in breaking into a network. Eavesdropping as well as appeals to people’s vanity or their authority are additional ways in which information can be obtained from unwitting sources. Most importantly, however, is the social engineer’s ability to take advantage of the fact that people are often ignorant of how valuable certain information is and how closely it should be guarded. In this respect, security experts warn that because we are becoming more and more dependent on technology, social engineering will remain the biggest threat to security systems. In order to protect you and your organization from social engineering, one should never give out or write down their passwords, choose passwords that are not common and therefore difficult to guess, be aware of what information is to be protected and always shred documents with sensitive information.
- dorrie on Bin Laden Story Brings an Abundance of Malware
- Sean Young on Warning: New rogue antivirus – ThinkPoint
- PC Tools on Top 5 Fake Security Applications in the 1st Quarter of 2011
- Mr Zoolook on The FBI and the Case of the YouTube Crazy
- Ringman on Top 5 Fake Security Applications in the 1st Quarter of 2011
Tag Cloudanonymous antivirus black hat SEO botnet businesses capacitors computer virus cybercrime cyberwarfare economy facebook fake av foreign hackers fraud google hackers hacktivism identity theft internet security koobface law malware online shopping password security phishing politics removal guide reports rogue antivirus scams scareware search engine poisoning SEO poisoning social engineering social media social media malware social networking spam tips trends trojan Twitter virus worm zeus