The previous article discussed how to use the latest browser to deal with malicious threats. Here we will talk about social engineering.
Avoid social engineering hazards
Social engineering is also called social engineering. When surfing the Internet, it is important to note that some attackers allow users to work for them and infect their computers. A large number of social engineering can launch attacks, and sometimes their text or word spelling is hundreds of errors, but this does not mean that users should ignore the danger. It is possible that a crafted attack can bypass the user's defense mechanism and entice the user to open an email attachment or download file containing malicious code. A targeted attack can even use user names, titles, and positions.
498) this. style. width = 498; "border = 0> |
Figure 1 |
How to deal with this trick? Here, I recommend a good website http://www.virustotal.com/zh-cn /. Users can upload any file (up to 10 MB) to the website, which uses dozens of anti-virus engines (such as Kaspersky and Symantec products) to scan the file. The website will send a report to the user to tell the user the opinion of each Anti-Virus engine on this file. Although some engines may give some plausible opinions, if the user receives multiple specific warnings to inform the user of specific threats and other warning information, it is best for the user to delete this file, instead of opening or executing it.
Without receiving the warning message, the security of a file cannot be guaranteed, but it gives users a very trustworthy guarantee. Use this website to check the attachment of each email that users are not at ease. Users can avoid malicious social engineering to the greatest extent possible.
If you think it is too troublesome to scan files through the website, use the free VirusTotal Uploader software. After the installation, You can conveniently use the upload function to send files to VirusTotal for scanning. The scan process for this website is shown in Figure 2:
498) this. style. width = 498; "border = 0> |
Figure 2 |