Archive

Category Archives for "Phishing"

19 Examples of Lines Hackers use for Social Engineering Attacks – Part 2 of 2

 

“This video is soooo funny. Just click the link and you’ll see what I’m talking about. OMG so cute!”

A personal contact approach is often used when hackers just want you to click the link. Many people don’t think twice about clicking a funny “youtube” link from a friend or relative to lift their spirits at work. But if the email address is unusual, don’t. Besides, why aren’t they sharing it with you on Twitter like usual? Continue Reading

Entry Points Where Social Engineering Can Put Network Security at Risk

Keeping your business data secure is a multi-layered process. You need to protect your network and databases through many steps, and part of that is making sure that your workforce knows how to repel social engineering hacks. Classic phishing attempts are well known to be the primary way that modern hackers gain access to business data. By getting just one employee to click an infected email link or visit an unsafe website by lying to them, hackers can gain access to secure logins, customer information, and even plant long-term spyware or ransomware on your network. Continue Reading

19 Examples of Lines Hackers use for Social Engineering Attacks, Part 1

Hackers will do anything to hack your network, steal money, or gain access to sensitive data. Hackers are also incredibly lazy. While they could compete with you in single cybersecurity combat; your firewalls vs their blackhat skills, they’d rathe take the coward’s way and trick an employee into breaching security for them.

This is known as a social engineering hack; When a hacker uses phone, email, or chat to fool an employee into using their own access to expose the network to malware, wire money, or send over sensitive information. The reason it works is beacuse hackers are good at coming up with a con-artists’s line that convinces staff members that they are legitmate despite any warning signs.

The best defense against this type of attack is to know what’s coming. not only that clicking links and doing unconfirmed favors is bad, but the types of lines that hackers use and why they have worked in the past. So let’s dive right into the psychology and methods of the social hacker. Continue Reading

8 Tips to Help Your Employees Avoid Social-Engineering Hacks

Phishing and other related forms of socially engineered hacking are among the biggest realistic threats to business data security. No matter how cutting-edge your firewall and virus scanning software may be, one employee checking their email or responding to a customer service ticket can still ‘invite’ ransomware and worse onto your internal business network by accident.

Social engineering hacks rely on causing the ‘human error’ factor of security breaches. They trick people using fake domain names, fake accounts that look like trusted contacts, and fake scenarios that fool or scare targets into clicking on an infected link or sharing sensitive information. This means that it is vital for every employee of every modern company to understand how social engineering hacks work and take steps to active avoid getting phished. Continue Reading

Whaling and Spearfishing: Targeting the Top People

Most phishing email goes after mass targets. It’s not particularly well-crafted, but the senders expect that if they hit enough mailboxes, some victims will open the attachment or visit the malicious website. A growing portion, though, targets specific companies or individuals with carefully crafted messages. It’s called spearphishing. When it’s aimed at high-profile individuals or large assets, it’s also called whaling — going after really big fish. (All right, a whale isn’t really a fish.) Continue Reading