What is social engineering?

Over the past decade, for many businesses, it has become aware of security and security for cyber security and safety. Cyber ​​criminals use computer software as a technique to theft of secret information of individuals and companies. Social engineering is a form of cyber crime in which criminals try to obtain secret information from their victims through illnesses and persuasion. This data is later used for identity theft or to access sensitive computer systems.

Phishing is a form of social engineering that uses false information to obtain personal data on an individual. This is usually done by sending e -mail that requires an individual to respond with a bank account number and a password or other sensitive personal data. The thief then leads the individual to the Internet application that saves personal data. This data will be used later for fraudulent purposes.

Malware is another technique that is widely used inSocial engineering. This is the Form Software designed for a nest inside the company. Software may lie for several months, but when it becomes active e -mail and private files can be pulled out of file systems and sent through telecommunications lines to the criminal organization. Malware can come in many forms, but is usually activated by opening an e -mail attachment.

communication on social networks has become popular for many individuals. This social environment is an area in which criminals are doing. Con artists can obtain and use information from social networking communities for erratic purposes, which is something that should be remembered by users of social networking sites.

Social networking sites are also used as an advertising basis for illegitimate websites. Having users unknowingly selects the site as a preferred link makes it use others to feedThey try summer in the social community. This fraudulent advertising system is widely used by criminals as a way to list worms or viruses on thousands of computers.

Vishing is a new form of social engineering that uses false voice to capture consumers. These voice voice declares that these are emergency calls of banks or credit companies regarding suspicious activities with consumers' account. When the consumer calls back, he is asked for a bank account information for verification purposes. This information was then stolen by an expert Vishing and is later used for credit and banking fraud purposes.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?