Top

Social Engineering techniques – What they are and how businesses can avoid them

September 15, 2015

Via: malware
Category:

Although it may be tempting to imagine hackers as being shy and socially inept types, whose only human interaction is via their computers, this is an assumption which rarely corresponds to the reality. In fact, in some cases, the social capabilities of hackers have worked greatly in their favor as a method of intrusion.

This technique is called and consists of tricking and manipulating the victim into committing a human error so as to compromise the of IT systems.

Social as a method of intrusion

This form of intrusion doesn’t rely on in the IT system, but rather a social interaction (online, by telephone, or face-to-face) between the attacker and the weak link in the IT security chain – the user.

Read More