How do hackers find your weakness in social networks?

Source: Internet
Author: User

Although the number of social engineering attacks is unlimited, they all have the following typical features:

Password theft

In terms of this common feature, hackers use information from social network files to guess a victim's password prompt. This technology is used to send emails to Twitter and Sarah Palin.

Handle Web threats

Download nowFriending: in this case, hackers will try to gain the trust of one or more people and trick them into clicking links or attachments containing malware to introduce security threats to their computers, for example, use the weakness of the enterprise system. Netragard CTO Adriel Desautels says, for example, he can start a phishing session and then send a picture of the boat he wants to buy.

Pretend to need your help

In this case, the hacker will send you a message and use the name of your friend to contact you. Then ask you to help him, for example, ask you to send him a workbook or send some data to him from the "office. "Anything you see from a computer may be forged by hackers. "Desautels said.

Disguised as your internal staff

If you pretend to be an IT help staff, you can imagine that you can get everything you want from an employee who never knows. "Almost 90% of the people we used once trust us because they think we work with them. "Desautels said.

In the Netragard blog, he described a vulnerability in which a staff member of Netragard disguised as an internal employee and successfully sent a phishing plan to their users, in this way, he collected employee certificates and finally obtained the right to access the entire enterprise infrastructure.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.