Monday, September 27, 2010

Experts explain social engineers most commonly used techniques of deception



In the area of security, social engineering refers to something or trying to cheat someone leaked sensitive information. Recently, the social engineers are to display their various means of fraud, this article we will discuss the most common form of social engineering scams.

Social networking scams

UK security firm Sophos senior technology consultant Graham Cluley said the social network has opened up a new program of social engineering scams, which is a means to steal account on Facebook, and then send a message to the account number or e-mail a friend , claimed to travel abroad need the money looted.

Facebook is often difficult to judge on whether I, as hackers often steal the social network user's password and account, and access to user account, you can see the user's friends and relatives, etc., but also know that vacation time and other information, and this cheat money. In addition, there are many social networking professionals to submit applications for users to download, and the social difficult to review all applications one by one.

Responsible for investigating Internet crime trends Sophos, found that a lot of Facebook applications with advertising software, the user screen will pop up all kinds of advertising, also install many applications also means that you provide to third-party access to your personal information entrance. Users install the application, it should seriously consider.

Twitter social networking in recent weeks, there will always be "read your own this video?" Link, if the user that sent the link to a friend, it is likely to click on the link. Click the link would be a similar fake site Twitter site, then the user entering their password, the information will be hackers to obtain.

Office of harassment

In the absence of computers, e-mail, web browser and the era of social networking sites to communicate, only phone, although it now appears somewhat dated, but the phone is also a pull social engineering was required filing fraudulent means, the security consultant in Colorado Lares Corporation founder Chris Nickerson said.

Fraudsters often carried out according to the situation at that time fraud has now infected many computers Downaup worm is a good example, scammers will first find out the infected computer company, then called in the past that can help, and ask for user password. This means using the people's fear of psychology and the lack of technical knowledge. If users think they ran into trouble, but this time just who can solve the problem occurs, users will automatically trust him.

"Hello, I'm Cisco, and came here to Nancy," Nickerson recently discovered fraud of such a door, wearing four U.S. dollars in the second-hand store to buy the Cisco shirt. Fraudsters in the home visit before the city take several weeks or months to understand the situation, they are usually disguised as customer or service technician, said they know what to say, the whom, and with confidence to an unauthorized person access to the equipment visit.

Similar to the fraud will always occur, many people often do not require people to prove their access rights, but simply to judge, on the other side to establish trust, to leak information.

Phishing scam

"You do not pay for your ebay purchase of goods, please click here to complete the payment", we often receive fake ebay emails sent on behalf of non-payment, or send fake Taobao name of "your buyers have to pay Please ship as soon as possible "to pay for cheating customers or shipping. This means actually taking advantage of people worried about their credit score or psychological, because the delay time, it will affect the transaction and may reduce the credit.

Experts do not click the e-mail them, if worried or ebay credit score, you can directly access the relevant web site, the query transaction status.

In addition there is a link that is fraud, a fake company to send mail on behalf of Human Resources, "you have to be included in the layoff list, if you want to apply for severance payment, please click here to register", and links are generally malicious link.

For a variety of fraudulent means, we should be alert, click on any of the links on the network before, it is best to think clearly.







Recommended links:



3DS MAX and some basic materials and PRACTICAL examples of parameters



My Favorite Online Gaming



Specialist Management And Distribution



Top Audio And Multimedia



M2TS To MKV



Input text input is also on the all-powerful plug



MKV to ZUNE



Sina's BRILLIANT and bleak: 5 CEO change



XviD to MP4



CENTURY "chain" war to build the new century Brewery



Thunder has more than 100 million users targeting NASDAQ



Good Browsers



Korean Media: China Wielded Against Piracy, "sword"



The origin and nature of marketing warfare



Longhorn can be run on some old computer



Produced With The VB Toolbox Floating Upper Normal Place Of Residence



Audio Bible C language compiler raises the question



Tuesday, September 14, 2010

BI, in the M & A growth?



Recently, IBM announced the acquisition will be 12 million in cash SPSS, a move that set off another wave of M & BI industry. SPSS is a leading provider of forecasting and analysis of software technology services company, the company's sales last year, nearly 303 million U.S. dollars, the product is widely used in market research, finance, sales data analysis and prediction of future behavior in areas such as data mining tools of its production clementine software, user-friendly, easy to operate, in order to SAS as the leading user market place.

From this merger, it seems that BI can see a trend that is increasingly focused on data analysis and the depth of excavation, analysis of the value of the field and competition are increasing.

BI review along the way, M & A cases occur frequently. 2007 was undoubtedly the best heavyweight of the three major M & A event:

March 2007, oracle company about 33 billion in cash buy Hyperion (business performance management software);

October 2007, SAP acquired the company to 6.78 billion U.S. dollars Business Objects (front-end display tools);

November 2007, IBM Corporation 50 billion purchase Cognos (business intelligence and performance planning software).

Other acquisitions include oracle BEA, M & SUN ... ... delves back even more numerous, see the following figure.



Look, it seems that merger is the ultimate way out for small companies, which the software giant consolidation through mergers and acquisitions constantly improving its product line, for users, can have "one-stop" choice was not a bad thing. Only a small BI vendors who compete in this environment is all the more difficult to survive, rely on innovation, alliances, or waiting to be the ultimate acquisition.

According to a recent survey of three different institutions, including Forrester Research, Gartner, and Aberdeen, on business investment in view of the priority survey, BI for the majority of enterprises, all have very high investment priority. There are many reasons, of course, the most fundamental driving force of course, needs 浣跨劧. In the era of information explosion, IT's value lies in the database to collect, process and prediction analysis. Business data, forecasting, analysis and mining is the future of measures is an important aspect of IT. Because the data are more and more massive database every day accumulation, analysis and if they can not derive valuable results, these data will be meaningless, will increasingly become a waste. BI is committed to addressing the huge amounts of data to the effective transformation of business decisions. Even in the present period of economic crisis, BI still can be reduced because of its cost as an investment priority.

BI in the ascendant, this area is also becoming ever more acute competition, mergers and acquisitions, integration and development ... ... BI project success is an accurate grasp of the data, and the business combination and the application of effective promotion. The M & A success or failure depends on customer demand, BI's development can only continue to meet growing customer demand for the. BI, M & A was, that night.







相关链接:



youtube to mpg CONVERTER



Videoformat Ipod



xbox 360 rmvb



Flv format