Ceglak Rally 2024 – searching for a student
WRSS WILiGZ is back! And with them the next edition of the Ceglak Rally 2024!
Nowadays, when almost every area of our life is connected to the Internet, including communication, entertainment, transport, shopping and more, it is becoming easier and easier to find frauds that can fall victim to us. Have you ever heard of social engineering? These are techniques that trick people into revealing their private details such as passwords or banking details or giving them access to a computer to install malicious software silently. Thieves and scammers use social engineering because it’s easier to get someone to reveal passwords than to hack them.
Generally speaking, social engineering attackers have one of two goals:
One of the best ways to protect yourself from social engineering attacks is to be able to identify them. Let’s look at some types of social engineering attacks.
People using phishing techniques pretend to be a trusted institution or person, convincing the victim to reveal personal data and other valuable items. Phishing attacks are targeted in two ways:
What techniques can fraudsters use?
E-mail phishing is the most traditional form of phishing. It uses e-mail messages prompting you to reply or take further actions related to the disclosure of data. Another example is phone calls with voice phishing (vishing). They can automatically record all incoming data. Recently, the most popular method among fraudsters is phishing SMS or messages in mobile applications containing an internet connection or requesting further action via a fake e-mail address or telephone number.
An example known to most of us may be the last wave of false text messages saying: “Dear Addressee, due to the weight of the ordered item, please make an additional payment. For your package to go on its way. Click on the link: ***“.
Remember always to verify such messages on the official helplines or applications of companies or banks that you use!
The bait offers the victim something tempting or interesting to lure them into the trap of social engineering. For this purpose, the scammer may offer a free music download or a gift card to trick you into providing your credentials. Popular scam methods may also include:
These are just a few of the hundreds of fraudsters’ methods every day. How to defend yourself and prevent social engineering attacks?
Here are some essential ways to protect:
Never click on links in any e-mails or messages,
Use multi-factor authentication,
Use strong passwords and a password manager,
Never leave your devices unsecured in public places,
Try not to log on to devices in public places (e.g. libraries, copy shops).
We should also remember that if we have any doubts – do not act rashly or under the influence of emotions!
Before sharing your data, think about whether the online promotion offered to you sounds too good to be true? Would your friend really ask you to send him money? Does the attachment or link look suspicious?
Attackers expect you to take action before weighing the risks, which means you should do the opposite!
Article prepared by Student Research Group – HSSE Inspektor