Information technologies have evolved to a level at which the developers, programmers, and security specialists all know what they’re doing, and are able to produce products and services that work and are reasonably secure. Of course, there’s always room for improvement.
Despite the amount of criminal hacking that goes on, users who effectively implement the appropriate measures and refrain from risky behaviors enjoy relative security.
The Wall Street Journal reported on a study by Dartmouth’s Tuck School of Business, quoting professor Eric Johnson:
“Criminal hackers are increasingly turning to digital versions of old-fashioned con games, literally gaining the confidence of employees through innocuous-seeming phone calls purporting to be from fellow workers, or even through regular mail, in order to entice them into downloading malicious code or revealing a password. The threat of data leakage is thus highest where a human is put in a position to decide whether to click on a link or divulge important information. The [phishing] techniques have become more hybrid.”
If you are reading this, chances are you do a pretty good job with information security to prevent identity theft, at least on the consumer level. But you also need to start thinking about avoiding Jedi mind tricks. Within the security world, these cons are known as “social engineering.”
Whether you receive a phone call, an email, or a visitor at your home or office, always question those who present themselves in positions of authority.
You should never automatically place your trust in a stranger.
Within your own home or business, set clear guidelines regarding what information should or should not be shared.
Keep in mind that when you lock a door it can be unlocked, either with a key, or with words that convince you to unlock it yourself. Always view every interaction, whether virtual or face-to-face, with a cynical eye for a potential agenda.
In the end, if a bad guy has pulled the wool over your eyes, they often will want to infect your Mac or PC. Keep your computers operating systems critical security patches up to date and install a total protection product.
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- Women Proved “Securest” in the Defcon Social Engineering Game
In a recent post (Hackers Play “Social Engineering Capture The Flag” At Defcon), I pointed to a game in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blurted out too much information. All five holdouts were women
- Hackers Play "Social Engineering Capture The Flag" At Defcon
Social engineering is a fancier, more technical form of lying. An alternative to traditional hacking, it is the act of manipulating others into performing certain actions or divulging confidential information. Social engineering or “social penetration” techniques are used to bypass sophisticated and expensive hardware and software in a corporate network. Smart organizations train their employees
- Who Are Your Kids Chatting With On Their Webcam?
Growing up we used to spend hours prank calling people we knew and also calling completely random numbers. The best calls were when you got someone on the line that got all mad and reacted in a way that made us want to call that person every five minutes forever. We just needed “stimulation.” Then we
- ADT Pulse: Remote Security Systems for Small Business
The standard old school home alarm system covers monitoring, doors, windows, motion and glass. Today’s digital wireless home alarms are much more. Today’s small business alarms are much much more. While these remote security systems are very simple and easy to program, they are very complex, but user friendly. Once you dive into the system it
- Fake Cops Home Invasion — Respecting Vs. Trusting
We live in a society that has many rules. We need rules because without rule, we’d devolve into chaos. Those rules are often broken by those who believe they are above them or are simply so desperate that they need to break them to get their next fix. Some of these rules are more “guidelines” than
Leave a Comment
You must be logged in to post a comment.