Top Social Engineering Tricks and How to Avoid Them

1 | 2 | 3 | 4 | 5 | 6 | 7
Next Top Social Engineering Tricks and How to Avoid Them-4 Next

Phishing: Phishing schemes have evolved from the common “Nigerian Prince” scams to more sophisticated schemes that are much more difficult to identify. Phishing schemes today can look very believable, coming from a credit card company, car dealership, insurance company or even the organization’s human resource department. In order to avoid these schemes, it is important to look closely at the URL – and if it looks like there is a modification at the end of the URL – to not click on the link. If the target had already provided the social engineer with their browser information, the social engineer could then execute a specifically-crafted browser exploit, which could grant full access to the target’s computer.

Organizations and consumers alike need to be vigilant in protecting themselves against security threats, and it’s important to know what to look for. Social engineers are trained to deceive people into giving away access to confidential information, and they are being increasingly employed by organizations to uncover security vulnerabilities, which may come from unlikely sources. Peter Fellini, trained social engineer with Zensar Technologies, shares the top social engineering tricks and how to avoid them.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.