Postingan

  What Does a Social Engineering Attack Look Like? Email from a friend If a criminal manages to hack or socially engineer one person’s email password they have access to that person’s contact list–and because most people use one password everywhere, they probably have access to that person’s social networking contacts as well. Once the criminal has that email account under their control, they send emails to all the person’s contacts or leave messages on all their friend’s social pages, and possibly on the pages of the person’s friend’s friends. Taking advantage of your trust and curiosity, these messages will: Contain a link  that you just have to check out–and because the link comes from a friend and you’re curious, you’ll trust the link and click–and be infected with malware so the criminal can take over your machine and collect your contacts info and deceive them just like you were deceived Contain a download  of pictures, music, movie, document, etc., that has malicious software em