The Latest in IT Security

Social Engineering techniques – What they are and how businesses can avoid them

16
Sep
2015
Social Engineering techniques – What they are and how businesses can avoid them

social_engineering

Although it may be tempting to imagine hackers as being shy and socially inept types, whose only human interaction is via their computers, this is an assumption which rarely corresponds to the reality. In fact, in some cases, the social capabilities of hackers have worked greatly in their favor as a method of intrusion.

This technique is called and consists of tricking and manipulating the victim into committing a human error so as to compromise the of IT systems.

Social as a method of intrusion

This form of intrusion doesn’t rely on in the IT system, but rather a social interaction (online, by telephone, or face-to-face) between the attacker and the weak link in the IT security chain – the user.

Read More

Leave a reply


Categories

WEDNESDAY, DECEMBER 13, 2017

Featured

Archives

Latest Comments

Social Networks