SOCIAL ENGINEERING
There are all kinds of devious methods that unscrupulous scammers use to get hold of unsuspecting marks’ data—whether it’s tricking them to install ransomware or some other kind of malware, such as a keylogger, or having them visit a booby-trapped website and enter valuable credentials. Most people nowadays know better than to reply to an email purporting to come from a Nigerian prince who needs some help organizing a wire transfer for his considerable inheritance. Indeed, most scammers no longer bother with these kinds of ruses; their game has been considerably upped.
They may play on local events, especially natural disasters. They may also send targeted email based on public information harvested from the target’s social media accounts. For this reason, you should be extremely careful about what information
You’re reading a preview, subscribe to read more.
Start your free 30 days