Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Drop down and tweak it!

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » January 2016 » Cybercriminals Use Social Engineering to Hack Victims

Cybercriminals Use Social Engineering to Hack Victims


Posted by: Timothy Weaver on 01/28/2016 10:17 AM [ comments Comments ]


Jean-Phillip Taggart, Senior Security Researcher at Malwarebytes, says: "Why use some hard technical flaw to acquire a password when you can simply ask the user for it?"

We are talking about social engineering hacks. These are various forms of hacks that rely on this type of attack:

1) Clickbait: "Huge snake eats man alive!" Headlines like that will draw people into clicking on a link. The link will lead to a malware infection.

2) Watering Hole Attacks: Hackers use the social media to track users interests. They then infect these popular websites to infect the victims.

3) Social networking attacks: "Cyber criminals know that one of the biggest vulnerabilities people have is their self-image," says Adam Kujawa, Head of Intelligence at Malwarebytes. "People are worried about what others think of them." Second, they make their messages appear to come from a friend. Click on a picture that is supposedly uploaded by a friend and you find yourself infected.

4) Ransomware: Cyber criminals have come up with law enforcement scams that make it appear as though the U.S. Department of Justice or FBI Cybercrime division are contacting you to claim that you've done something illegal. Again, a click and you are infected and your files are encrypted.

5) Phishing/spear phishing: Phishing is a form of social engineering that relies on fooling people into handing over money or data through email. Spear phishing emails are crafted in order to make someone believe they're from a legitimate source.

A healthy dose of skepticism goes a long way. Verify information. Contact the claimed source.

Source: MalwareBytes


« Cheetah Sync Allows Fast Android to PC Syncing · Cybercriminals Use Social Engineering to Hack Victims · ISIS Recruiting Indian Hackers »




Comments
comments powered by Disqus

MajorGeeks.Com » News » January 2016 » Cybercriminals Use Social Engineering to Hack Victims

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition