Want to know how to make a million dollars in a day? Click here! Boom. You were just phished. Silly isn’t it? Well, what would you say if I told you this kind of stuff happens every day except it’s not a fun website, it’s a dangerous hacking tool that would steal your information? Yeah, the smile fades and the reality sinks in. Most people are not very tech savvy and would believe that those links would really do the promise it gave.
Our host Joseph Dillon provides us with many methods to use these “Social Engineering” attacks and explains the dangers behind them. First off, Social Engineering attacks don’t have to be a simple link or even anything computer related. It could actually be accomplished by sitting across the table or looking over a person’s shoulder. Yes, no technology necessary to steal information. The whole concept of Social Engineering has to do with methods of getting user’s to give you their information. This could be enacted by making them click a link, giving you unauthorized access, or accessing restricted access by sneaky means.
Here are some classic Social Engineering tools to know about. Pretexting is a simple method of providing a cheap and effective story to obtain the trust of others. As many people have put it, “Nobody questions the guy with the clipboard”. Tailgating is a method where someone follows another person through a secured door. This individual could pretend they are running late and ask for you to hold open the door. Phishing as briefly touched on before, is a fake link that could lead to downloading malware or a script which someone could use for gain.
We are to be weary of strange links…and individuals. Always make sure that procedure is followed when it comes to security checks, otherwise the next target could be you.