Social Engineering


Social ...
is the attempt to gain access to ... data (such ...
... and credit card numbers) by gaining trust.
This methodof gaining access to a system is very popular among Social Engineering is the attempt to gain access to sensitive data (such aspassword, usernames and credit card numbers) by gaining trust. This methodof gaining access to a system is very popular among hackers.
It is oftensurprisingly easy and even more often successful. THIS IS PROBABLY THE MOSTSUCCESSFUL AND MOST USED METHOD OF GAINING ENTRY TO ACCOUNTS!Here's how it works.
You might receive a phone call from a representative ofyour computer company claiming there is a problem which requires immediateattention. He may offer to come right over and fix it (or, in a variation,he might send you a disk in the mail).
Of course, while he is there, hereboots your system with a "diagnostic" floppy inserted into the drive. Whenthe "tests" are done you will be relieved to find out from him that nothingis wrong with your system.
Naturally, you were just infected with a Trojanhouse which gives this stranger complete access to your system and all ofyour data files.A more common social engineering scheme (especially on America Online) is tosend out an email which says there is a problem with your account. Would youplease send your username and password by return email so it can be fixed?Or perhaps you are asked to visit a web site, which naturally requires youto log in with your username and password.
You might be asked to call aphone number, where the very official sounding person on the other end willjust want to verify that your account is yours by getting your credit carddata.An example of a standard social engineering attack is shown below. From: [email protected] To: [email protected] Subject: Account Compromised We have detected a major security breach to several accounts on our network.
While we do not believe that your account was among those compromised by hackers, we recommend that you check your account data immediately. To verify your account, just visit the following URL: http://www.yourISP.Com/security/view.htm Login to your account and check your data.
Make special note of the last login data and time. If anything appears to be incorrect, please send an email to security using the link at the bottom of the page.
Thanks for your immediate attention. YourISP securityWhen you visit the site it shows a username and password prompt.
You enteryour username and password, which sends you to an "incorrect password - tryagain" screen. You hit the "continue" button, which places you on the REALISP site.
Now when you enter your username and password, you are, of course,logged in. You are greatly relieved to find that your account data has notbeen changed and think nothing else of the issue.
Of course, you just gaveyour username and password to a hacker!And that's all that social engineering is about - gaining your trust,getting your vital data, and abusing that data.How do you protect against this? Be aware that it exists and don't respondto these kind of things. If someone asks you for your password, then tellthem to buzz off.
Nobody needs to know your password for any reason. Let merepeat: DO NOT GIVE OUT YOUR PASSWORD TO ANYONE FOR ANY REASON.
THERE IS NOTA VALID REASON FOR ANYONE TO NEED IT. If the person who asked really workswhere he says he works, then believe he, he can ALREADY get to your account.Why on earth would he be asking you for your username and password?If you think the email or whatever might be accurate, then call the ISP ornavigate to their site yourself (don't use anything from the email or letterthat your received - use the menu's and screens provided by the ISP).
Forexample, say you get a letter from your ISP saying to change your passwordimmediately. It has a phone number and URL.
Throw the letter away withoutreading either. Now, find your ISP phone number and URL yourself - perhapsin your browser help menu or in the manual or letter that arrived when yousigned on.
This bypasses anything that might be wrong in the letter or emailthat you received.If you do suspect that you've received a social engineering attack, be surethat you notify your ISP, MIS department or whoever needs to know. The onlyway this kind of criminal can be caught is if the crime is reported quicklyand accurately.
Article Tags: Social Engineering Source: Free Articles from ArticlesFactory.com .

Top blog stories

A review of Idmobile.com

Idmobile.com offers both pay-as-you-go and contract plans. Pay-as-you-go plans are ideal for customers who don't want to be tied down to a long-term contract, and they can purchase bundles of data, minutes, and texts as and when they need them.

see post

A review of Idmobile.com

Idmobile.com offers both pay-as-you-go and contract plans. Pay-as-you-go plans are ideal for customers who don't want to be tied down to a long-term contract, and they can purchase bundles of data, minutes, and texts as and when they need them.

see post

AO.co: Online Shopping Made Simple

AO.co is a trusted expert in TVs, washing machines, clothes dryers and other household appliances. AO.com is one of the largest retailers in the UK and it specializes in electronics, clothes and home furniture.

see post

For our people.

At Three, we believe phones are good. They just make life better. Easier. And more fun. But we all need to find a balance that works for us. Our mission is to help our customers use their phones to live their best lives.

see post

We make your life easier

We make your life easier Since 1992, we’ve been helping customers get the best deal on their dream phone. We firmly believe in giving you the highest quality, for the lowest price. That’s why we work with three of the UK’s leading networks to do all the haggling for you,...

see post

FOUR BRANDS BECOME ONE. CURRYS.

Currys PLC is a leading omnichannel retailer of technology products and services, operating through 800+ stores and 16 websites in seven countries.

see post

Halfords - Quicker, Easier, and Convenient.

At Halfords, we're all about the journey. With more than 700 stores with over 10,000 colleagues, we're the UK's leading retailer of automotive and cycling products. We are also the leading operator in MOT, tyres, car servicing and car repairs - pleasing more than 750,000 customers every year.

see post

FOUR BRANDS BECOME ONE. CURRYS.

Currys PLC is a leading omnichannel retailer of technology products and services, operating through 800+ stores and 16 websites in seven countries.

see post

Sky - Epic. Endless. Entertainment.

It's important to us that everyone gets great customer service and can enjoy our products, no matter their level of sight. So, if you're blind, partially sighted or struggle to see or read the screen, we’ve a range of features to help you get the most from our products and...

see post

Nasty Gal - We exist for the “girl in progress”.

Look iconic, without the hassle— using Nasty Gal discount codes, you can shop your favorite pieces for way less by simply entering one of our promotional codes (of your choice) at the checkout. From delivery offers, to promo deals, we keep ‘em coming, so you always have the offer you...

see post

Digital Publishing From Past to Now

The Covid-19 has caused the school and universities to shut down around the world creating a major issue in Learning and Education. As this virus spreads through the interaction and if social distanci... The Covid-19 has caused the school and universities to shut down around the world creating a major...

see post

Why it’s Important to Manage Your Holiday Calendars?

A printable calendar 2021 is a prominent online platform where you download printable calendars of your choice. These calendars can be customized as per our client requirement with photo, text, logo, or any other image. If you are thinking of planning a dream vacation tour with family and kids but...

see post

The German People Is A Genius Not A Superior One


The world hasn’t forgotten the Superiority of the German People theory adopted by Hitler and resulting in massive destruction represented in the killing of millions of people and the destruction... The world hasn’t forgotten the Superiority of the German People theory adopted by Hitler and resulting in massive destruction represented...

Will EU Remain Spectators in Arms Race?


Emmaneul Macron, the youngest president in French history and the youngest French head of state since Napoleon, has said: ‘In the absence of a legal framework, they (EU member states) could rapi... Emmaneul Macron, the youngest president in French history and the youngest French head of state since Napoleon, has...

The Characteristics of the Dictators


1-The dictator believes that all his opinions are always right. 2-The dictator believes that he is the embodiment of the country. Any kind of opposition against him is considered a crime against the ... 1-The dictator believes that all his opinions are always right. 2-The dictator believes that he is...

Why is Getting My Dog Groomed So Expensive?


We know the importance of getting our dogs groomed. But not all of us can actually afford the grooming of our dogs luxury pet centre.   We know the importance of getting our dogs groomed. But not all of us can actually afford the grooming of our dogs luxury pet centre....

Dog Sitting Services - How a Professional Dog Sitter Gives You Peace of Mind


You need to travel, or you are traveling frequently. What are you doing with your pets or your beloved dog? You can’t take your dog with you when you are traveling.    You need to travel, or you are traveling frequently. What are you doing with your pets or your beloved...

How Can I Train a Dog at Home


This article teaches you how to train a dog at home. You can toilet train her at home. You can also train her in removing unwanted behaviours and many exciting tricks. You can train a dog anywhere. So, how can I train a dog at home ? In fact, most...

Reasons why grooming your dog is good for you and the dog


Having a dog is great but comes with a lot of responsibilities, just like having any other pet. The main responsibility is grooming the dog regularly, something that some people still question the importance of it. If you have been wondering whether you should be grooming your dog, then below...

Sterilization of Dogs - An Overview


Neutering (also known as castration) and spaying are the common term used to describe the surgical procedure during which both testicles (in males) and uterus and its parts (in females) are removed in order to sterilize (make infertile) a male and female dog respectively. At Pet Prime Veterinary Clinic (Dog...

Reasons Why Dogs Become Aggressive


You may have noticed cases of your dog suddenly showing signs of aggression or rather becoming aggressive and threatening to bite. Such nasty behaviours and signs of aggression by your dog may be frustrating Well, if you have no idea why your dog gets aggressive all over a sudden and...

Things You Need to Consider Before Adopting a Dog


The loyal nature of dogs makes them the perfect pets, whether you have a family or not. However, most of the time, people rush into adopting pets only to end up being overwhelmed with the responsibilities, which are physical, emotional, and psychological. If you have been considering adopting a pooch,...

Search topic

Things You Need to Consider Before Adopting a Dog

The loyal nature of dogs makes them the perfect pets, whether you have a family or not. However, most of the time, people rush into adopting pets only to end up being overwhelmed with the responsibilities, which are physical, emotional, and psychological. If you have been considering adopting a pooch,...

Learn more