120 likes | 211 Views
Did You Know. Kevin Mitnick defines it as “the act of gaining sensitive information or unauthorized access privileges by building inappropriate trust relationships with insiders.” In most cases the hacker never comes face-to-face with the victim. Social Engineering. 3. 2. 1.
E N D
Kevin Mitnick defines it as “the act of gaining sensitive information or unauthorized access privileges by building inappropriate trust relationships with insiders.” In most cases the hacker never comes face-to-face with the victim. Social Engineering
3 2 1 Social Engineering Techniques SMiShing Vishing Phishing
Identity information Phishing
Usually done by creating fake e-mail, instant messaging and websites to lure unsuspecting people to enter in their personel information such as usernames, password, and credit card information Phishing • They represent themselves as trustworthy entities that you know of such as popular social websites, auction sites, online payment processors or even IT administrators • Anytime someone asks you for any personel information without you initiating the contact, you should question the validity of that request
I’m senior manager. I need your password authorize a transaction for a client. It’s urgent. The client is waiting, I will hold. My password is p@ssw0rd Hacker pretending to be Senior Manager Victim Vishing
A combination of voice and phishing • Software engineers use a telephone system that uses a Voice over IP (VoIP) • Vishing is used for financial gain to steal credit card number or other personal information used in identity thief schemes from around the world. Vishing
A combination of SMs and phiSHING • Scammers are targeting mobile devices to get you to reveal your personal information. • Send text messages to you and ask to validate or respond to the request. • Once responded, scammer just got you and launched a worm or a malware on your mobile device. • Once downloaded on your mobile devices, spyware can eavesdrop on all your conversations gathering information about you. SMiShing
You had better take control By understanding the techniques Social Engineering And Protect yourself and your assets before it’s to late!