Thursday, October 14, 2010

Experts explain social engineers most commonly used techniques of deception



In the area of security, social engineering refers to something or trying to cheat someone leaked sensitive information. Recently, the social engineers are to display their various means of fraud, this article we will discuss the most common form of social engineering scams.

Social networking scams

UK security firm Sophos senior technology consultant Graham Cluley said the social network has opened up a new program of social engineering scams, which is a means to steal account on Facebook, and then send a message to the account number or e-mail a friend , claimed to travel abroad need the money looted.

Facebook is often difficult to judge on whether I, as hackers often steal the social network user's password and account, and access to user account, you can see the user's friends and relatives, etc., but also know that vacation time and other information, and this cheat money. In addition, there are many social networking professionals to submit applications for users to download, and the social difficult to review all applications one by one.

Responsible for investigating Internet crime trends Sophos, found that a lot of Facebook applications with advertising software, the user screen will pop up all kinds of advertising, also install many applications also means that you provide to third-party access to your personal information entrance. Users install the application, it should seriously consider.

Twitter social networking in recent weeks, there will always be "read your own this video?" Link, if the user that sent the link to a friend, it is likely to click on the link. Click the link would be a similar fake site Twitter site, then the user entering their password, the information will be hackers to obtain.

Office of harassment

In the absence of computers, e-mail, web browser and the era of social networking sites to communicate, only phone, although it now appears somewhat dated, but the phone is also a pull social engineering was required filing fraudulent means, the security consultant in Colorado Lares Corporation founder Chris Nickerson said.

Fraudsters often carried out according to the situation at that time fraud has now infected many computers Downaup worm is a good example, scammers will first find out the infected computer company, then called in the past that can help, and ask for user password. This means using the people's fear of psychology and the lack of technical knowledge. If users think they ran into trouble, but this time just who can solve the problem occurs, users will automatically trust him.

"Hello, I'm Cisco, and came here to Nancy," Nickerson recently discovered fraud of such a door, wearing four U.S. dollars in the second-hand store to buy the Cisco shirt. Fraudsters in the home visit before the city take several weeks or months to understand the situation, they are usually disguised as customer or service technician, said they know what to say, the whom, and with confidence to an unauthorized person access to the equipment visit.

Similar to the fraud will always occur, many people often do not require people to prove their access rights, but simply to judge, on the other side to establish trust, to leak information.

Phishing scam

"You do not pay for your ebay purchase of goods, please click here to complete the payment", we often receive fake ebay emails sent on behalf of non-payment, or send fake Taobao name of "your buyers have to pay Please ship as soon as possible "to pay for cheating customers or shipping. This means actually taking advantage of people worried about their credit score or psychological, because the delay time, it will affect the transaction and may reduce the credit.

Experts do not click the e-mail them, if worried or ebay credit score, you can directly access the relevant web site, the query transaction status.

In addition there is a link that is fraud, a fake company to send mail on behalf of Human Resources, "you have to be included in the layoff list, if you want to apply for severance payment, please click here to register", and links are generally malicious link.

For a variety of fraudulent means, we should be alert, click on any of the links on the network before, it is best to think clearly.







Recommended links:



Infomation Games Board



How to remove a user's password and then stood BACK to



EVD GB Classic caught in foreign Control of position to defend the right to speak



Lucent Technologies Qingdao Company



Find out the psychological make PROMOTIONS



Window tab bar: small label, Big VISION



Write a custom task, easily extend Ant



MKV To MP4



3G2 to MOV



Shop RELIGION



Operators to REMIND: strange sounds for calls do not hang back on



Top Registry Tools



apdproxy.exe cpu ERROR repair these errors now



Emasculated IPHONE ye use?



RMVB to MP4



Compare Desktop



2007, the Chinese simulation years



No comments:

Post a Comment