Showing posts with label Social Engineering. Show all posts
Showing posts with label Social Engineering. Show all posts

Tuesday, September 20, 2011

How Hackers Use Social Engineering to Infect Your Computer

beliefs and assumptions - thinking about something that is unexamined - are key elements in any attempt to elicit a response from the target ("Marks"). In today's Internet, this effort is called "social engineering" and is used to get you to click on something before thinking about the consequences.


Some of the more common uses assumptions are as follows:


My virus protection is adequate


This assumption is probably used them all. We are constantly bombarded with commercials touting how much better one over the other. All letting users believing that, depending on how the product is chosen, it will protect your computer from hackers.


This assumption is, therefore, have a number of store allows hackers to exploit vulnerabilities in the antivirus program can not protect against. Things such as links to infectious payload - links to e-mail, instant messages, forum posts, social networks (Facebook, MySpace, etc. ).


Friends and family would send me a virus


for hackers to harvest log on to online accounts and information stored on your computer. They can also take control of your e-mail client. Then they will send you an email containing links or attachments contagious that everyone in your contact list with a simple come-ons that recipients click.


Since it appears to have come from a friend or family member, our guard is down, and we will click on what is in the message before you think about it.


If the web site says you need something, that's for sure


This is one of the most dangerous conditions ever. Web pages are a collection of words designed to elicit a response from the visitors. Our confidence is a site associated with the experience of our site and our history site / brand.


If he says that we need to update our Flash Player to view their content, we assume that we should do. No, not a genuine update Flash player?


If he says that Adobe Acrobat is required to view our documents, we question that? Usually not, we will click on the link to get what we think is the Acrobat.


Virtual con artists and advertising


con artists used for some personal contact with the label to make your pitch and control labels. Today, the Internet has given con artists and advertisers the ability to make their pitches on the way (web site look and feel) is designed to reduce our resistance to their field.


Find out how.

Monday, September 19, 2011

Social Engineering

Social engineering is an art that is practiced by someone who will try to get your confidence through a dishonest way. They will try to "help" you or ask for help and become your new "friend". You have to keep guard at all times. If someone asks for a password, social security number, account numbers, pin, or any other type of sensitive information, question them about it. Ask them why they need this information. First of all, you should never give your password to anyone. You can get a phone call from someone at work stating that they just started and need help accessing their system account. May they even mention the name of the manager to make you believe they are legitimate employees.


there are still some banks will ask for full Social Security number over the phone. Tell them you're only going to give them the last 4 digits. See if they will agree to this. If not, tell them that the government advises people not to give that information over the phone and see if they are willing to change their policies.


Not too long ago, I had a mechanic on a quick oil change drives me to ask for your PIN number on my debit card, because he could not give me the remote keyboard.


Would you comply with his request?


Unfortunately, we live in a time where we need to protect our personal information in everything we do. Identity theft can happen at any time and it does not matter where you are.


social engineering Tips:


only protection against social engineering attacks is through education and training. Here are a few important points to address and manage the mounting obstacles to social engineering attacks:


- if anything sounds out of place or odd, err on the side of caution

.

- Always request proof of identity over the phone and in person. Check the ID by calling the appropriate authority or the issuing company.


- Assign a number of different types of personal information, such as social security numbers, telephone numbers, dial-in numbers, user names, passwords, network addresses, etc. The higher the number, the greater the security around these items should be maintained.


- If anyone asks for confidential information, find out why they want it and that you are authorized to be given

.

- If anyone asks for confidential information, find out why they want it and that you are authorized to be given

....

-. Never make or change their passwords over the phone


Sorry, you must be alert at all times when it comes to your personal information. If you happen to work at a financial institution, such as bank or credit union, you also have to protect your customer's private information, such dobro.Najgorem case for on-line threats is identity theft. This is one of the main reasons for protecting your family while on-line.Iz other reasons would include protecting their children from online predators and stalkers.


ID theft occurs when someone gains access to your personal information, such as credit card numbers, social security numbers, and any other personal information that will enable them to commit fraud or other more serious criminal offenses, from using your personal information hide their true identity.


If you think this happened to you, please review the following steps:


- Close any compromised credit card accounts immediately. Contact your bank to see if it is necessary to freeze their current bank account information, or if it is OK just to change your password. Make sure that your bank will monitor your accounts for possible fraud.


- Call toll-free telephone numbers in any of the three countries, consumer reporting agencies to place initial fraud alert on your credit report. This could prevent someone from getting a new credit card in your ime.Brojevi and addresses are listed below,


1 Experian: 888-397-3742 / / P.O. Box 2002, Allen TX 75 013


2 Equifax: 800-525-6285 / / P.O. Box 740241, Atlanta, GA 30374-0241


3 TransUnion: 800-680-7289 / / Fraud Victim Assistance Division, PO Box 6790 Fullerton CA 92834-6790


- After you place an initial fraud alert on your credit report, it should remain there for 90 days. You should wait about one month before the new credit report, because some fraudulent activity May not show immediately. Check to make sure all of your personal information is accurate on the new report.


- use new passwords on any new accounts you open

.

-. Avoid using your mother's maiden name, date of birth, last four digits of your Social Security number, your telephone number, or a series of consecutive numbers in your new password


- Make sure you receive any billing statements at the time

.

. - If your personal information is stolen, make sure you file a report with local police department, and to report to the Federal Trade Commission