Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - May the nForce be with you.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews



IObit Black Friday Sale

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Mozilla Firefox
4. Smart Defrag
5. MusicBee
6. Microsoft Visual C++ 2015-2022 Redistributable Package
7. Sergei Strelec's WinPE
8. Visual C++ Redistributable Runtimes AIO Repack
9. Dolby AC-3/AC-4 Installer
10. McAfee Removal Tool (MCPR)
More >>

top reads

Star Lossless vs Lossy: When FLAC, APE, and ALAC Beat MP3 and When They Don't

Star Google Search Tricks You'll Actually Use in 2025 and Beyond

Star Fresh PC Checklist: First 12 Things to Do On a New Windows 11 Machine

Star Running AI Models Locally: What They Are, Where to Find Them, and How to Get Started

Star Deciding Between Idle State, Sleep Mode, and Shutdown: What's Best for Your PC?

Star How to Fix VMware Workstation "The Update Server Could Not Be Resolved" Error Installing VMware Tools

Star How to Remove Google Gemini from Your Phone (and Your Life)

Star Windows Bloat Removal Guide: Debloat Safely and Keep What You Need

Star Windows 11 Repair Playbook: SFC, DISM, CHKDSK Without Breaking Stuff

Star Gmail Using Your Emails and Attachments for AI Training: Here's How To Opt Out


MajorGeeks.Com » News » January 2016 » Cybercriminals Use Social Engineering to Hack Victims

Cybercriminals Use Social Engineering to Hack Victims


Posted by: Timothy Weaver on 01/28/2016 10:17 AM [ comments Comments ]


Jean-Phillip Taggart, Senior Security Researcher at Malwarebytes, says: "Why use some hard technical flaw to acquire a password when you can simply ask the user for it?"

We are talking about social engineering hacks. These are various forms of hacks that rely on this type of attack:

1) Clickbait: "Huge snake eats man alive!" Headlines like that will draw people into clicking on a link. The link will lead to a malware infection.

2) Watering Hole Attacks: Hackers use the social media to track users interests. They then infect these popular websites to infect the victims.

3) Social networking attacks: "Cyber criminals know that one of the biggest vulnerabilities people have is their self-image," says Adam Kujawa, Head of Intelligence at Malwarebytes. "People are worried about what others think of them." Second, they make their messages appear to come from a friend. Click on a picture that is supposedly uploaded by a friend and you find yourself infected.

4) Ransomware: Cyber criminals have come up with law enforcement scams that make it appear as though the U.S. Department of Justice or FBI Cybercrime division are contacting you to claim that you've done something illegal. Again, a click and you are infected and your files are encrypted.

5) Phishing/spear phishing: Phishing is a form of social engineering that relies on fooling people into handing over money or data through email. Spear phishing emails are crafted in order to make someone believe they're from a legitimate source.

A healthy dose of skepticism goes a long way. Verify information. Contact the claimed source.

Source: MalwareBytes


« Cheetah Sync Allows Fast Android to PC Syncing · Cybercriminals Use Social Engineering to Hack Victims · ISIS Recruiting Indian Hackers »




Comments
comments powered by Disqus

MajorGeeks.Com » News » January 2016 » Cybercriminals Use Social Engineering to Hack Victims

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition