Social Engineering - Why it matters
The art of manipulating people in order to gain access to technology that would otherwise be out of reach is known as "social engineering."
No matter how secure a system is, the human element can almost always be fooled. Therefore, humans are commonly the weakest link in the tech world. A legitimate user will always be able to log in, no matter how many security measures you put in place.
As far as human exploits go, phishing is among the most effective. In a similar way to the practice of fishing, phishing is a collection method from a target in order to gain access to a system. This can result in millions of dollars being lost, a company's bankruptcy, or even the theft of an individual's identity. Your results may vary if you succumb to a cleverly crafted attack.
Whenever someone's email is phished, I've commonly noticed the following changes to their email account:
- Their email contains a random rule that hides new messages and forwards them to the attacker.
- Suspicious emails are usually sent, deleted, or received by contacts from the phished account.
However, the good news is that in the majority of cases, they are easy to spot.
Some things to watch for:
- Incorrect spelling and grammatical errors The email address, not just the from name (for example, if you receive an email with the name Google but the email address xyz@outlook.com, this is a red flag).
- Verify the links by hovering your cursor over the email's urls. Do they appear shady?
- In the email, do you see a thread of previous correspondence, but you've never spoken to this person? Probably a trick.
Some phishing emails may appear to be legitimate, and it can be difficult to tell the difference between the real thing and a hoax.
Even though phishing isn't the only method, it's the most common, and many other methods are variations of it. With only a little technical know-how, anyone can do it.
Have you or someone you know been a victim of a phishing scam or had their account information stolen? Is your tech life ready for a sturdier foundation? Try out our tech support service for $1! Check it out here.
Related Articles
Don't Get Blindsided by Unexpected Charges: Why Reading What You Agree to Matters
The importance of reading what you agree to The inclusion of terms and conditions in various forms of communication, such as emails and popups, is becoming more and more common in the modern digital era. It's critical to realize that you might ...
Interesting Current Threats - January 12
Spymail is a hidden trigger in an email you get sent that tracks email opens, clicks and potentially forwarding. Let's be honest. This isn't anything super new. It's been around for years, and pretty much affects anyone who's ever received an ...
Remote Work: The Must-Have for a Happy and Productive Workforce
Remote work is the ability to work from any location, without having to report to a specific office. During the pandemic, remote work has flourished. Numerous businesses realized that it was possible for their employees to work remotely and still ...
How to get the wrong information about technology
So you have a tech problem, and you post on social media. You get an influx of your neighbors and friends chiming in on possible solutions. The question is, who's right? Any of them could be, or none of them could be. The number one way I see ...
SEO vs Marketing
Recently I've come upon some confusion on people thinking that just because their website is Search Engine Optimized, that they're going to get more business or that they don't need to do legwork of their own to gather business. Let me put the halt ...