Articles

How do you become liable to social engineering?

by vishal tripathi Digital Markiting Expart

Social Engineering refers to developing new methods to trick people into sharing or giving their hush-hush information. The hackers have become so knowledgeable of the codes that they make a planned move that can only be noticed once it has done some harm to the system. PC security software developers believe that it is only a matter of seconds for malware to get in the system and start destruction.

What vulnerabilities of humans can be advantageous for social engineers?

Eagerness or Curiosity

Social engineers make the best the best use of it by sending alluring emails, showing and fascinating ads.

Internet security software team has narrowed down the attacks into the following,

• Email regarding winning, scandals, and private videos

• Scamming the person by showing ads to find out who visited the profile

• USB attacks

• Newsjacking

• Enticing videos of calamities or paranormal activity or accidents


Jitters or anxiety

Human psychology plays an extensive and crucial role in executing the attacks. The crackers know what will trigger angst in person that could lead to a successful attack.

Here are a few ways in which invasions are made,

• Anonymous cold call asking for details to prevent the user from a made up incursion

• Vishing

• Pretending the system to under an attack so that fake software could be downloaded

• Blackmailing for extortion


Misgiving

Human nature is highly skeptical and therefore, he has doubts about every attack that he makes. However, the confusion can sometimes prevent the mishap but hackers make the best use of it for carrying out bigger scams.

The following examples illustrate the attacks carried out on doubts,

• Payment based frauds and cracks

• Apple i-tunes attack

• Social media hacking


Greed

The desire for anything can never be fulfilled, no matter how much you have of it. The virus scanner software development team has carried out a survey where they found decision making of people getting clouded under the umbrella of strong emotions.

The few scams that are made by taking advantage of greediness,

• Lottery Scam

• Email regarding cash prize or iPhone winning

• Phishing campaigns 


Haphazardness

Many of us do not even think twice before clicking on the link or downloading something as directed in faulty emails. This often leads to several intrusions that can have drastic effects.

A few examples of such invasions are,

• Blackhat SEO

• Eavesdropping

• Keylogging


Sympathy or empathy

In case of an act of God people or health problems tend to become sympathetic towards the victims. The developed soft corner makes them put a helping hand forward in whichever way possible.

The following incursions represent the best use of such attacks,

• Fake orphanage accounts

• Cancer treatment donation

• Flood donation in a fraud’s account

• Scams taking advantage of crowdfunding websites


Disregard

One must be alert while surfing, chatting online, or during a face to face conversation with anyone. PC virus protection team suggest to double-checking the identity of the person before sharing any access with that person.

Here are a few examples of such attacks,

Pretexting 

Diversion theft


Blindness or callowness

Many times it had happened that people get blindsided by amazing offers which could be faked using some graphics

Social engineers make the best of use of in the following manner,

• Gift card scam

• Credit card scams

• Cryptocurrency scams


How does social engineering take place?

Social engineering has following way to attack,

1. Emails- Tricked emails get many customers to fall in the net of incursions

2. Social media- One of the vast platforms for connecting with people has its own set of pitfalls that have led to several severe attacks in the name of trust and companionship

3. Phones- Cold calls lead to a breach in security by threatening the receiver

4. Face to face- People often meet in a friendly manner to get the other person talking in order to get some private information which they can use for their advantage


Friendly note

Computer security software developers suggest staying cautious while clicking on any link or downloading any software. 

Think twice to save time.


Sponsor Ads


About vishal tripathi Senior   Digital Markiting Expart

174 connections, 3 recommendations, 650 honor points.
Joined APSense since, June 19th, 2017, From Noida, India.

Created on Oct 4th 2018 01:40. Viewed 455 times.

Comments

No comment, be the first to comment.
Please sign in before you comment.