{"id":134,"date":"2021-01-15T10:48:00","date_gmt":"2021-01-15T05:18:00","guid":{"rendered":"http:\/\/blog.secureitlab.com\/?p=134"},"modified":"2021-03-06T11:42:57","modified_gmt":"2021-03-06T06:12:57","slug":"do-you-know-how-they-hacked-your-account-part-two-user-reacting-to-social-infection-source","status":"publish","type":"post","link":"https:\/\/www.tikaj.com\/blog\/do-you-know-how-they-hacked-your-account-part-two-user-reacting-to-social-infection-source\/","title":{"rendered":"Do you know how they hacked your account? Part two: User reacting to social infection source"},"content":{"rendered":"

In previous article\u00a0<\/a>we have covered the Drive by download and spyware infection. In this part will know more about social engineering, phishing and spamming infections.<\/p>\n

    \n
  1. Social engineering
    \n<\/strong>Social engineering is one of the most commonly used methods of cyber hacking, which requires little to no technology. It relies on psychological manipulation to persuade the victims to perform certain actions or divulge confidential information.
    \n
    \nHOW YOU CAN BE COMPROMISED:<\/strong> In this case, cyber criminals use lies, impersonation, tricks, bribes, blackmail, and threats to attack information systems. Phishing is also a form of social engineering.
    \nFor example, cyber criminals may pose as contractors, exterminators, fire marshals and technicians to go unnoticed as they steal your secrets or trick you into divulging confidential information about your company.<\/li>\n<\/ol>\n
      \n
    1. Phishing<\/strong>
      \nPhishing is (yet) another method that cyber criminals use in order to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by posing as a trustworthy entity in emails or other means of electronic communication.Phishing is an example of\u00a0social engineering<\/strong>\u00a0techniques used to deceive users, and exploits the poor usability aspects of current web security technologies.<\/p>\n

      HOW YOU CAN GET INFECTED:<\/strong> A phishing email could seem that it legitimately comes from your bank, and could trick you into entering valid credentials on a fake website.
      \nPhishing is done through emails, instant messaging apps or social media posts (on Facebook, Twitter, LinkedIn, etc.).<\/li>\n<\/ol>\n

        \n
      1. Spam\u00a0\u00a0<\/strong>
        \nWe all know that spam is made of those unwanted, unsolicited emails that clog our inboxes. But, in recent years, spam has spread to instant messaging apps, texting, blogs, forums, search engines, file sharing and social media.<\/p>\n

        HOW YOU CAN GET INFECTED: <\/strong>While spam itself may not seem very dangerous, it sometimes carries malware, spreads viruses, worms and other types of threats, such as financial theft, identity theft, data and intellectual property theft, fraud, and deceptive marketing.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"

        In previous article\u00a0we have covered the Drive by download and spyware infection. In this part will know more about social engineering, phishing […]<\/p>\n","protected":false},"author":120,"featured_media":2663,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"categories":[85,250,182,120],"tags":[],"class_list":["post-134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-anti-phishing","category-anti-phishing-solution","category-compromised","category-social-media-monitoring"],"_links":{"self":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/comments?post=134"}],"version-history":[{"count":3,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/134\/revisions"}],"predecessor-version":[{"id":2680,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/134\/revisions\/2680"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/media\/2663"}],"wp:attachment":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/media?parent=134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/categories?post=134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/tags?post=134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}