TheLinuxOS
  • Home
  • About
Sign in Subscribe
Security

WHAT IS SOCAIL ENGINEERING ATTACK?

Hammad Mahmood

04 Apr 2021 — 2 min read
WHAT IS SOCAIL ENGINEERING ATTACK?

Social engineering is the act of hacking into the mind of humans. The most vulnerable thing for any hacker is getting into the mind of a person associated with a certain organization.

SOCIAL ENGINEERING

“Social Engineering or Mobile Phishing Attack”. These attacks are mostly very useful against such organizations that are big and invest a heavy amount of their revenue in cybersecurity.

The attacker gains access to one of a user’s credentials by pretending to be a security consultant. He tells them that their account has been compromised and can they have to share their login credentials for verification. This attack for so effective due to the research that the attacker does about the history of the victim.

After getting the hold of only one customer’s ID the hackers then exploited and gathered the information of several customers.

Attacker Gains Access To All The Information By Just Pretending
All Data Stolen By Attacker
HOW ARE SOCIAL ENGINEERING ATTACKS CARRIED OUT?

Social engineering attacks are carried out in the following steps,

  1. The attacker gains information regarding the victim.
  2. They look into the services that the victim uses (the website they want access to).
  3. They then send a phishing email or call the victim in a very convincing way.
  4. The emails usually state that the user’s account has been compromised and they need to provide their credentials to gain access to their account.
  5. The victim provides the information (via call) or writes the credentials on the fake website created by the user and is then redirected to the original website on which he then logs in without facing any issue.
  6. In this way, the attack gains the login info and then can do whatever he/she wants with it.
hacking life cycle
Social Engineering Life Cycle
HOW TO STAY SAFE FROM THESE ATTACKS

As the world is becoming more and more virtual and everything is being converted to the internet, it is time that we take our security seriously and do the necessary steps needed for our data protection,

  1. First of all, if we receive such calls or emails, we should quickly inform the official law enforcement agencies.
  2. Gain awareness regarding these types of attacks spam, phishing, and fake calls/emails.
  3. Avoid visiting or opening suspicious sites.
  4. Use secure channels that have end-to-end encryption.
  5. Enable 2-Factor authentication on all our accounts.
cybersecurity
Data Protection

We should all take the matter of cybersecurity seriously and educate ourselves regarding the threats of it. So, that we have secure online life and avoid such attacks.

Read more

6 Reasons Why Linux is Better Than Windows

6 Reasons Why Linux is Better Than Windows

Introduction Every person who sets up their workspace, first of all, gets some of the best equipment pieces so their work can progress in the most relaxing and peaceful way. Besides, having a great set of hardware pieces not only enhances the comfort level but also supports the workload that

By Guest 14 Jul 2021
Hassle-free Ways To Keep Your macOS And Its Applications Up To Date

Hassle-free Ways To Keep Your macOS And Its Applications Up To Date

Technology updates with every passing minute. Using an outdated one might end up causing a hindrance to your work routine. So, don't! By this, we don't mean that you have to purchase the latest laptop. That's definitely going to be a financial strain. But

By Guest 30 Jun 2021
Do I need a special router for VoIP?

Do I need a special router for VoIP?

Since the question revolves around "whether you need a special router for VoIP?" It clearly indicates that you have an idea about VoIP, right? It is a packet-based technology that transmits the digitized voice over an ethernet/IP network. It is a perfect example of recent developments for

By Guest 24 Jun 2021
Running Out Of Cloud Space? Try This To Make Space On Your Google Drive

Running Out Of Cloud Space? Try This To Make Space On Your Google Drive

Google Drive offers a free 15 GB storage capacity to all account users, but it can soon run out of space if you’re hoarding old and obsolete files on the cloud. As amazing as the option to back up and store free data is, it can become a junk

By Guest 21 Jun 2021
TheLinuxOS
  • Sign up
Powered by Ghost

TheLinuxOS

Thoughts, stories and ideas.