Very effective social engineering scams

1:07 PM
Very effective social engineering scams -

It is amazing how ingenious cyber criminals, but victims must also take responsibility for falling for these tricks ., particularly when the victim is a company that has failed to train its employees in cyber security measures

Ransomware

science fiction is here: who would have ever thought there would ever such a thing as criminals steal away someone's personal information (word processing files, any type of image, etc.), shuffling through the encryption and then demanding a ransom in exchange for the "key" remote control "unlock" the encryption?

payment in Bitcoin distance that can not be traced. Payment is usually at least $ 500 and more degenerate victim awaits.

The virus that plagues a computer to steal files from someone called ransomware, a type of malicious software (in this case, "cryptolocker" and "CryptoDefense"). But how viruses enter your computer first

This is called social engineering:. tricking users by enabling their PC to be infected, or fool to reveal personal information

Often a phishing e -mail is used: it has a subject line that attracts attention which prompts the user to open the message contains a link they click on the link, and a virus is downloaded Or, link them... leads to a website that then downloads the virus.

These emails sometimes designed to look like they are from the company the user is working, often go to computers in the workplace where employees get fooled. these types of attacks are lucrative for their instigators.

Fraud Funeral

If you want to inform a relative or friend who has another dear person left this earth ... would you send an e-mail or phone this person? It seems that strong news like this would justify a phone call and voice interaction.

So if you ever receive an e-mail from a funeral home stating that a loved one passed to you, and to click on a link to the funeral home to learn details of the ceremony burial ... consider it a scam.

because if you click the link of the burial site or you are redirected to the rogue server because it has already created an infected burial look at the site in advance. This is a virus will be downloaded to your computer.

Phishing Scam Credit card

You get a phone call. An automated voice identifies as your credit card company (they'll say "credit card company" rather than the specific name). He then said something like: "We are studying what appears to be a fraudulent charge on your card"

They will ask if you make a particular purchase lately, then hit 1 for yes and 2. no. If you do not hit, you are told to enter your credit card number, security code to three digits and expiration date. you just tired a thief everything he (or she) need to go on a spending spree online or on the phone.

never order something over the phone and all you had to give up was the credit card number, expiration date and security code? this trick is also for employees. the calls come from an automated machine that generates thousands of these calls.

Scam Healthcare sheet

You receive an e- mail that appears to come from your employer or health care provider that you get through work. This may come to you on your computer at home or the one you use at work. The e-mail is an advertisement of some attractive changes in your health care plan.

The message may refer to something personal about you such as marital status, income or number of dependents. When enough of these emails are pumped with automated software, the personal circumstances of many beneficiaries will compete with those identified in the e-mail, such as income and number of children. The user is then attracted to click on a link in the email, and once this is done click ... malware is released.

Scam Facebook Group Company

scammers analyze Facebook and LinkedIn seeking employees of a particular company and to create a group. This aim of the groups is to collect information to fraudsters can enter the center or a business website. Once all members join groups, scammers will ask various questions innocuous and initiate discussions pleasant taste that make everyone feel at ease.

Over time these scammers will lead discussions to leak data bits that allow criminals to enter a facility under a stolen identity or to communicate with the specific employees who have advanced access to computer systems in an attempt to obtain user names and passwords.

Previous
Next Post »
0 Komentar