Lets see Few more attacks that are happening in our daily lives but are unaware about it.
Social engineering is a term we are hearing now a days a lot. But what is it?
Social engineering is a technique which is aimed to target a victim to reveal the information or performing some illegitimate tasks for his benefits. It is like psychological manipulation for the performing actions.
Lets see few techniques with examples below
Phishing refers to a technique of fraudulently obtain the private information. It is an attack to steal your money, by getting to know about the personal information by the person.
Example : The e-mail which gets especially in festival times usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN or a credit card number.
Vishing also known as "voice phishing", is again the same practice of revealing the information over a telephone system to gain access to the private personal information especially credit card pin and One Time Password(OTP)s.
Example : The Fraud person calls you as the bank representative and may ask you to share the information about the bank credit card and OTPs. After sharing such information the personal data might get vanished in few minutes.
Smishing refers to the technique where the fraudster send an Short Message Service (SMS) to the victim containing malicious link. To get personal information about someone using text messaging.
Example : The fraud person approaches you through message about any lottery won or he might say an authorized person from the reputed bank or company and gives you a link to click and you would get registered to it. But its a fraud its a malicious link which reveals your personal information.
Baiting is kind of attack, attackers leave malware-infected USB flash drives, pendrive, mobile charging in locations people will find them metro stations, parking lots, railway stations, give them legitimate and curiosity-piquing labels, and wait for victims.
Juice jacking aim is to compromise of devices like phones and tablets which use the same cable for charging and data transfer, typically a USB cable. It is similar to baiting where victim plugs on the device in the public or untrusted area.
The honey pot or honey trap involves making contact with an individual who has information or resources required by a group or individual, the trapper will then seek to entice the target into a false relationship in which they can glean information or influence over the target. The term "honey trap" is also used when social media sites, dating sites are used to gain access to a victim. These kind of people either need money or personal may have psychic behavior.
Examples : Now a days a lot of people affected with this kind of people irrespective of the age and gender. Most of them just need money, few for personal benefit.
Catfishing is a deceptive activity in which a person creates a fictional persona or fake identity on a social networking service, usually targeting a specific victim. The practice may be used for financial gain, to compromise a victim in some way, as a way to intentionally upset a victim, or for wish fulfillment.
Examples : The person catfishing uses another person's photos and life facts to make them appear as a real person. Their primary reason to appear as a fake person is to befriend the other person for a relationship or financial gain.
Spoofing is the act of disguising a communication or identity to gain an illegitimate advantage. Spoofing can apply to emails, phone calls, and websites, IP address, or Domain Name System (DNS) server.
Example : Email Spoofing when an email is sent from a fake sender address, asking the recipient to provide sensitive data. The victim finds it legitimate and enter the sensitive data. Call spoofing is where a phone scammer will falsify the calling number to trick a user into picking up or making a call look more legitimate.
Piracy or online piracy or digital piracy is the practice of distribution of copyrighted content without the permission of the authorized person/organization. Intellectual property comes under this theft.
Example : movies, music, software, books downloading from unauthorized website.
Comments
Post a Comment