Site Overlay

Social engineering

Social engineering attacks (31%) don’t rely on technical sophistication so much as trusted. Because they prey on human vulnerabilities instead of technological ones, this type of cyber crime is especially difficult to guard against. Types of social engineering attacks include phishing and more elaborate physical schemes. For example, an attacker might leave an infected USB near the entryway to your office building in the hopes that an employee will insert it into their computer.

The phishing topic was also a part the first article in this trilogy.

Depends about the region you are living and the company you are working for, you may have also heard about Dumpster Diving. Dumpster Diving is when the attacker is ransacking the garbage of the victim for clues and clues about the social environment and/or confidential information. These can then be used in a subsequent call to gain the victim’s trust.

Leave a Reply

Your email address will not be published. Required fields are marked *