Do you know how they hacked your account? Part two: User reacting to social infection source


In previous article we have covered the Drive by download and spyware infection. In this part will know more about social engineering, phishing and spamming infections.

  1. Social engineering
    Social engineering is one of the most commonly used methods of cyber hacking, which requires little to no technology. It relies on psychological manipulation to persuade the victims to perform certain actions or divulge confidential information.

    In this case, cyber criminals use lies, impersonation, tricks, bribes, blackmail, and threats to attack information systems. Phishing is also a form of social engineering.
    For example, cyber criminals may pose as contractors, exterminators, fire marshals and technicians to go unnoticed as they steal your secrets or trick you into divulging confidential information about your company.
  1. Phishing
    Phishing is (yet) another method that cyber criminals use in order to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by posing as a trustworthy entity in emails or other means of electronic communication.Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability aspects of current web security technologies.

    HOW YOU CAN GET INFECTED: A phishing email could seem that it legitimately comes from your bank, and could trick you into entering valid credentials on a fake website.
    Phishing is done through emails, instant messaging apps or social media posts (on Facebook, Twitter, LinkedIn, etc.).

  1. Spam  
    We all know that spam is made of those unwanted, unsolicited emails that clog our inboxes. But, in recent years, spam has spread to instant messaging apps, texting, blogs, forums, search engines, file sharing and social media.

    HOW YOU CAN GET INFECTED: While spam itself may not seem very dangerous, it sometimes carries malware, spreads viruses, worms and other types of threats, such as financial theft, identity theft, data and intellectual property theft, fraud, and deceptive marketing.

Deeksha is a seasoned cybersecurity expert, dedicated to defending the digital domain from cyber threats. With a strong grasp of technology's dual-edged nature, she excels in threat detection, risk mitigation, and ensuring regulatory compliance. Her proactive approach and unwavering commitment make her a reliable guardian in the ever-evolving digital landscape.

Enterprise Security And Intelligence | TIKAJ

Security. Intelligence. Defense.
[email protected]

Under attack? Cyber Emergency?
[email protected]

  • Products
  • Services

Get Secured Today!

Click that button and let’s chat! We promise to turn the murky, often scary world of cybersecurity into a walk in the digital park for your organization. Together, let’s make cybersecurity a piece of cake!