DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Blog

How to protect yourself from social engineering?

Reading Time: 8 mins read
in Blog

Welcome to CyberHygiene, our weekly newsletter, where we share tips and actionable data to help everyone stay safe online.

First time seeing this? Please subscribe.

No alt text provided for this image

Social engineering is a technique used to manipulate and deceive people. Malicious actors exploit human psychology to gain private information, access or valuables.

Social engineering attacks usually involve a series of highly-calculated steps where con artists invest weeks or months into nurturing a slow-building relationship with their victims.

 The attacks are not always related to cybersecurity. Social engineers can reach out and trick you without ever having to speak a word. Social engineering attacks work just as well in person, over the phone, on social media or via email.

1. What are the most common types of social engineering attacks?

  • Pretexting

Attackers focus on creating a good pretext or a fabricated scenario “that they can use to steal their victims’  personal information.” These attacks commonly take the form of a scammer pretending to need certain information from their target in order to confirm their identity.

  • Baiting

Baiting attacks use a false promise to pique a victim’s greed or curiosity. They lure users into a trap that steals their personal information or inflicts their systems with malware.

  • Shoulder Surfing

It is the act of  looking over someone’s shoulder, writing down or memorizing logins or passwords.

  • Watering Hole Attacks

Watering hole attacks infect popular web pages with malware to impact many users at a time. It requires careful planning on the attacker’s part to find weaknesses in specific sites. They look for existing vulnerabilities that are not known and patched — such weaknesses are deemed zero-day exploits.

  • Tailgating or piggybacking

An unauthorized person takes advantage of an authorized person to gain access to restricted areas. These areas have physical or electronic authentications required to gain access.

  • Dumpster Diving

Attackers collect information from discarded materials such as old computer equipment (e.g., hard drives, thumb drives, DVDs, CDs) and company documents that were not disposed of securely.

2. How does social engineering attack work?

  1. Information gathering : the attacker collects information from public sources such as google and social media.
  2. Establishing trust: the attacker contacts and tries to connect with the targeted user on a personal level.
  3. Exploitation: the attacker gets money, access to a system, steals files, or obtains trade secrets.
  4. Execution: the attacker performs the final goal and exits the scam.
No alt text provided for this image

3. How to spot social engineering attacks?

Most social engineering attacks employ one or more of the following tactics

  • Posing as a trusted brand
  • Posing as a government agency or authority figure
  • Inducing fear or a sense of urgency
  • Appealing to greed

4. How to prevent social engineering attacks?

1) Security awareness

  • Don’t share valuable information: Personally identifiable information (PII) with a third party. It’s important to know what data is considered PII.
  • Be suspicious of requests for data: Any request for data should be received with caution. Ask questions and verify the sender’s identity before complying with the request.

2) Access control policies

  • Use multi-factor authentication and unique credentials for all your online accounts.
  • Be wary of downloading free apps, files, programs, software or screensavers – malicious code, like spyware (that secretly monitors what you do online) and keystroke loggers (that secretly track what you are typing) can be hidden within the downloaded file or app and used to access personal information, such as login credentials.

3) Cybersecurity technologies

  • Spam filters and secure email gateways can prevent some phishing attacks from reaching employees in the first place.
  • Firewalls and antivirus software can mitigate the extent of any damage done by attackers who gain access to the network.
  • Keeping operating systems updated with the latest patches can also close some vulnerabilities attackers exploit through social engineering.

5. What do you do if you think you are a victim?

  • If you believe you might have revealed sensitive information about your organization, report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity.
  • If you believe your financial accounts may be compromised, contact your financial institution immediately and close any accounts that may have been compromised.
  • Watch for any suspicious charges to your account. Immediately change any passwords you might have revealed. If you used the same password for multiple resources, make sure to change it for each account, and do not use that password in the future.
  • Watch for other signs of identity theft.
  • Consider reporting the attack to the police, and file a report with the Federal Trade Commission and the Federal Bureau of Investigation (FBI) IC3.

6. What resources are available to better understand Social Engineering?

1) Books

  • Thinking, Fast and Slow by Daniel Kahneman
  • Influence: The Psychology of Persuasion, Revised Edition by Robert Cialdini
  • No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing by Johnny Long & Kevin Mitnick
  • Cybercrime through Social Engineering: The New Global Crisis by Christopher S. Kayser
  • Social Engineering: The Science of Human Hacking by Christopher Hadnagy

2) Courses

  • SOCIAL ENGINEERING TRAINING by Red Goat
  • Social Engineering by Cybrary

3) Documents

  • Definitive Guide to Social Engineering Attacks, Tools, and Prevention by Cyberx
  • Social engineering: A cheat sheet for business professionals by TechRepublic
  • Guide to Preventing Social Engineering Fraud by Chubb

4) Podcasts

  • The Social Engineer Podcast by Social-Engineer, LLC
  • A chat with social engineering hacker Rachel Tobac by Naked Security
  • FBI, This Week: Social Engineering by FBI 
  • Hacking Humans Podcast by Dave Bittner

5) TV Show

  • Tiger Team 

6) Videos

  • Cyber Review: Cybercrime through Social Engineering with Christopher Kayser and Sofia C. V.
  • Cyber Decoded: Social Engineering
  • Cyber Tip: Beware of Social Engineering
No alt text provided for this image

For more content about social engineering, visit:

https://cybermaterial.com/social-engineering/

Subscribe and Comment.

Copyright © 2022 CyberMaterial. All Rights Reserved.

This article was written by Marc Raphael with the support of Team CyberMaterial, Sofia C. V., Nicolás Peña, Fabino R. Darius

Follow us on LinkedIn, Twitter, Reddit, Instagram, Facebook, Youtube, and Medium.

Tags: BlogCybersecuritySocial EngineeringSocial Engineering BlogTips
ADVERTISEMENT

Related Posts

What and why should you know about cyber attackers?

What and why should you know about cyber attackers?

March 24, 2023
Why should email security matter to you?

Why should email security matter to you?

March 16, 2023
How To Browse The Internet Safely With A VPN

How To Browse The Internet Safely With A VPN

March 10, 2023
How To Browse The Internet Safely With A VPN

How To Protect Yourself with Cyber Insurance

March 1, 2023

More Articles

Incidents

Iranian Steelmaker Halts Production Following Cyberattack

June 27, 2022
Alerts

Ubuntu security advisory (AV22-130)

March 9, 2022
Alerts

CISA and ACSC Release Top 2021 Malware Strains

August 5, 2022

In Scope – The Healthcare Security Podcast

April 6, 2022
Alerts

NortFBI Warns of Fake Reward Scams in Games

March 13, 2023
Tool

GitHub Actions

March 30, 2022

Hardware Security Module (HSM)

April 18, 2022
Course

FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response

June 29, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.