Posts: 14,704
Threads: 9,636
Thanks Received: 9,083 in 7,233 posts
Thanks Given: 9,886
Joined: 12 September 18
25 January 19, 09:27
![[Image: phishing-psychology-featured-1-1024x672.jpg]](https://media.kasperskydaily.com/wp-content/uploads/sites/92/2019/01/24050705/phishing-psychology-featured-1-1024x672.jpg)
Quote:When speaking about vulnerabilities, we generally mean coding errors and weaknesses in information systems. However, other vulnerabilities exist right in a potential victim’s head.
It’s not a question of lack of awareness or neglect of cybersecurity — the way to deal with those problems is more or less clear. No, it’s just that the user’s brain sometimes functions a little differently than IT security gurus would like, under the influence of social engineering.
Social engineering is essentially a fusion of sociology and psychology. It is a set of techniques for creating an environment that leads to a predetermined result. By playing on people’s fears, emotions, feelings, and reflexes, cybercriminals can gain access to useful information. And it is largely this “science” that lies at the heart of most of today’s targeted attacks.
Four main feelings that scammers prey on:
- Curiosity
- Pity
- Fear
- Greed
It wouldn’t be right to call them [i]vulnerabilities[/i]; they are simply natural human emotions. Perhaps a more apt description would be “channels of influence” through which manipulators try to sway their victims, ideally in such a way that the brain is actuated automatically, without the application of critical thinking. To achieve this, cybercriminals have plenty of tricks up their sleeve. Sure, some ploys work better on some people than others. But we decided to take a look at a few of the most common, and explain exactly how they are used.
Full reading:
https://www.kaspersky.com/blog/phishing-...ogy/25440/
Posts: 185
Threads: 64
Thanks Received: 449 in 184 posts
Thanks Given: 784
Joined: 27 December 18
25 January 19, 11:31
(This post was last modified: 25 January 19, 11:36 by Deep900.)
It's always important to evaluate the safety of an URL by seeing if it contains forms to insert data and it seems suspicious, this is mainly for FUD URLs (URLs that are not detected by security software). If we are not sure about the safety of a website do not insert any data in forms, this can prevent to get phished. Modern browser extensions and browser security filters should reduce the risk of visiting malicious URLs when browsing, but always keep the eyes open!