Avast Blog_ViewPoints:Social engineering – It’s not just about phishing
#1
Lightbulb 
Quote:
[Image: TVDumYE.png]
When deception is used to hack your mind

What does “social engineering” mean?

The term “social engineering” may sound arcane and intimidating, and in some ways, it is. But most of us have encountered some form of social engineering many times — on the internet, in our emails, and in newspapers and magazines. The email advance-fee scam, which most of us will remember as the Nigerian Prince email scams from years ago, is one form of social engineering — deceiving the victim into believing they have something to gain.

Phishing emails are also social engineering, posing as a trusted organization, a friend, or a colleague in order to manipulate us into surrendering information. However, it’s not as simple an equation as “social engineering equals scam.” Scams and confidence tricks must employ social engineering techniques to succeed, but social engineering is often much more complex. The ways in which attackers can trick, manipulate, and pressure people is shocking, and often sinister.

In his book How to Hack a Human: Cybersecurity for the Mind, security expert Raef Meeuwisse offers this definition: “...the act of constructing relationships, friendships or other human interactions for the purpose of enticing the recipient to perform an inadvisable action or reveal secret information.” In cybersecurity terms, this means preying on our emotional responses to make us voluntarily compromise our own security.

But social engineering exists everywhere in completely legal, even if somewhat morally dubious, ways. Marketing employs social engineering techniques to improve sales. You may have encountered a website offering a special, apparently significant discount, complete with the countdown: “Deal ends in 00:05:00”. In truth, there is no discount and the “deal” does not end; but this is an effective marketing strategy. The illusion of needing to make a quick decision and the appearance of a bargain pressure users into making a purchase they would not normally make.

And politicians and political lobbyists use social engineering techniques to get our support all the time.    
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Surfshark VPN : Award-winning VPN servi...
How can generative...jasonX — 09:58
Surfshark VPN : Award-winning VPN servi...
What is post-quant...jasonX — 09:50
Adobe Acrobat Reader DC 2026.001.21411
Adobe Acrobat Read...harlan4096 — 09:47
Acronis True Image 2021 Build 32010
It's been a while si...jasonX — 09:27
AntGROUP Inc. / VCap-developer
VCap Downloader ...jasonX — 09:23

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (45)wapedDow
avatar (49)oapedDow
avatar (42)Sanchowogy
avatar (46)MeighGoask
avatar (38)urumahiz
avatar (44)techlignub
avatar (43)Stevenmam
avatar (50)onlinbah
avatar (50)fuspeukChark
avatar (44)werriewWaiNg
avatar (38)Freemanleo
avatar (43)cdoubapKit
avatar (38)lystraPonia
avatar (31)smith8395john
avatar (51)steakelask
avatar (45)Termoplenka
avatar (43)bycoPaist
avatar (49)pieloKat
avatar (43)ilyagNeexy
avatar (51)donitascene
avatar (51)Toligo
avatar (46)Rodneykak
avatar (49)tradeSmode
avatar (38)RobertUtelt

[-]
Online Staff
There are no staff members currently online.

>