These common human traits are the basic ingredients in the con-man's recipe for trickery.
Social engineers use psychological manipulation to trick human beings into divulging sensitive information that can then be used to break into systems. SE scams also prompt people to take an action (like click on a bad link) that can infect a machine and allow a criminal to get in and start stealing data.
These attacks can take place human to human. ("Hello, this is IT. Your computer is infected and I need your password.") Or through email and social media, for example a phishing email that informs you your PayPal account is suspended.
But there are certain intrinsic qualities most humans possess that social engineers exploit in order to pull off their attacks. And knowing how they do it might help us better guard against exploits. Dark Reading spoke to social engineering experts for a breakdown of these traits – and what happens when an SE finds a way to "break in" to human beings.
About the Author(s)
You May Also Like
Guarding the Cloud: Top 5 Cloud Security Hacks and How You Can Avoid Them
April 4, 2024Cybersecurity Strategies for Small and Med Sized Businesses
April 11, 2024Defending Against Today's Threat Landscape with MDR
April 18, 2024Securing Code in the Age of AI
April 24, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024Black Hat Asia - April 16-19 - Learn More
April 16, 2024