Monday, September 27, 2010

Experts explain social engineers most commonly used techniques of deception



In the area of security, social engineering refers to something or trying to cheat someone leaked sensitive information. Recently, the social engineers are to display their various means of fraud, this article we will discuss the most common form of social engineering scams.

Social networking scams

UK security firm Sophos senior technology consultant Graham Cluley said the social network has opened up a new program of social engineering scams, which is a means to steal account on Facebook, and then send a message to the account number or e-mail a friend , claimed to travel abroad need the money looted.

Facebook is often difficult to judge on whether I, as hackers often steal the social network user's password and account, and access to user account, you can see the user's friends and relatives, etc., but also know that vacation time and other information, and this cheat money. In addition, there are many social networking professionals to submit applications for users to download, and the social difficult to review all applications one by one.

Responsible for investigating Internet crime trends Sophos, found that a lot of Facebook applications with advertising software, the user screen will pop up all kinds of advertising, also install many applications also means that you provide to third-party access to your personal information entrance. Users install the application, it should seriously consider.

Twitter social networking in recent weeks, there will always be "read your own this video?" Link, if the user that sent the link to a friend, it is likely to click on the link. Click the link would be a similar fake site Twitter site, then the user entering their password, the information will be hackers to obtain.

Office of harassment

In the absence of computers, e-mail, web browser and the era of social networking sites to communicate, only phone, although it now appears somewhat dated, but the phone is also a pull social engineering was required filing fraudulent means, the security consultant in Colorado Lares Corporation founder Chris Nickerson said.

Fraudsters often carried out according to the situation at that time fraud has now infected many computers Downaup worm is a good example, scammers will first find out the infected computer company, then called in the past that can help, and ask for user password. This means using the people's fear of psychology and the lack of technical knowledge. If users think they ran into trouble, but this time just who can solve the problem occurs, users will automatically trust him.

"Hello, I'm Cisco, and came here to Nancy," Nickerson recently discovered fraud of such a door, wearing four U.S. dollars in the second-hand store to buy the Cisco shirt. Fraudsters in the home visit before the city take several weeks or months to understand the situation, they are usually disguised as customer or service technician, said they know what to say, the whom, and with confidence to an unauthorized person access to the equipment visit.

Similar to the fraud will always occur, many people often do not require people to prove their access rights, but simply to judge, on the other side to establish trust, to leak information.

Phishing scam

"You do not pay for your ebay purchase of goods, please click here to complete the payment", we often receive fake ebay emails sent on behalf of non-payment, or send fake Taobao name of "your buyers have to pay Please ship as soon as possible "to pay for cheating customers or shipping. This means actually taking advantage of people worried about their credit score or psychological, because the delay time, it will affect the transaction and may reduce the credit.

Experts do not click the e-mail them, if worried or ebay credit score, you can directly access the relevant web site, the query transaction status.

In addition there is a link that is fraud, a fake company to send mail on behalf of Human Resources, "you have to be included in the layoff list, if you want to apply for severance payment, please click here to register", and links are generally malicious link.

For a variety of fraudulent means, we should be alert, click on any of the links on the network before, it is best to think clearly.







Recommended links:



3DS MAX and some basic materials and PRACTICAL examples of parameters



My Favorite Online Gaming



Specialist Management And Distribution



Top Audio And Multimedia



M2TS To MKV



Input text input is also on the all-powerful plug



MKV to ZUNE



Sina's BRILLIANT and bleak: 5 CEO change



XviD to MP4



CENTURY "chain" war to build the new century Brewery



Thunder has more than 100 million users targeting NASDAQ



Good Browsers



Korean Media: China Wielded Against Piracy, "sword"



The origin and nature of marketing warfare



Longhorn can be run on some old computer



Produced With The VB Toolbox Floating Upper Normal Place Of Residence



Audio Bible C language compiler raises the question



No comments:

Post a Comment