• Home
  • Apple
    • iPhone
    • iOS 12
    • iOS 13
    • Jailbreak
  • Linux
    • Linux How To
    • Linux Distro
    • Linux Commands
  • Coding
    • Linux Bash Programming
    • Python
    • Web
  • Operating System
  • Security
  • AI
Sign in
Welcome!Log into your account
Forgot your password?
Password recovery
Recover your password
Search
Friday, January 27, 2023
  • TheLinuxOS
  • Write For Us
  • Privacy Policy
  • Disclaimer
  • About Us
  • Contact US
Sign in
Welcome! Log into your account
Forgot your password? Get help
Password recovery
Recover your password
A password will be e-mailed to you.
TheLinuxOS
  • Home
  • Apple
    • iPhone
    • iOS 12
    • iOS 13
    • Jailbreak
  • Linux
    • Linux How To
    • Linux Distro
    • Linux Commands
  • Coding
    • Linux Bash Programming
    • Python
    • Web
  • Operating System
  • Security
  • AI
Home Security WHAT IS SOCAIL ENGINEERING ATTACK?
  • Security
  • Uncategorized

WHAT IS SOCAIL ENGINEERING ATTACK?

By
Hammad Mahmood
-
April 4, 2021
0
444
social engineering
Fake Support

Social engineering is the act of hacking into the mind of humans. The most vulnerable thing for any hacker is getting into the mind of a person associated with a certain organization.

SOCIAL ENGINEERING

 “Social Engineering or Mobile Phishing Attack”. These attacks are mostly very useful against such organizations that are big and invest a heavy amount of their revenue in cybersecurity.

The attacker gains access to one of a user’s credentials by pretending to be a security consultant. He tells them that their account has been compromised and can they have to share their login credentials for verification. This attack for so effective due to the research that the attacker does about the history of the victim.

After getting the hold of only one customer’s ID the hackers then exploited and gathered the information of several customers.

Attacker Gains Access To All The Information By Just Pretending
All Data Stolen By Attacker

 

HOW ARE SOCIAL ENGINEERING ATTACKS CARRIED OUT?

Social engineering attacks are carried out in the following steps,

  1. The attacker gains information regarding the victim.
  2. They look into the services that the victim uses (the website they want access to).
  3. They then send a phishing email or call the victim in a very convincing way.
  4. The emails usually state that the user’s account has been compromised and they need to provide their credentials to gain access to their account.
  5. The victim provides the information (via call) or writes the credentials on the fake website created by the user and is then redirected to the original website on which he then logs in without facing any issue.
  6. In this way, the attack gains the login info and then can do whatever he/she wants with it.

 

hacking life cycle
Social Engineering Life Cycle

 

HOW TO STAY SAFE FROM THESE ATTACKS

As the world is becoming more and more virtual and everything is being converted to the internet, it is time that we take our security seriously and do the necessary steps needed for our data protection,

  1. First of all, if we receive such calls or emails, we should quickly inform the official law enforcement agencies.
  2. Gain awareness regarding these types of attacks spam, phishing, and fake calls/emails.
  3. Avoid visiting or opening suspicious sites.
  4. Use secure channels that have end-to-end encryption.
  5. Enable 2-Factor authentication on all our accounts.
cybersecurity
Data Protection

We should all take the matter of cybersecurity seriously and educate ourselves regarding the threats of it. So, that we have secure online life and avoid such attacks.

 

  • TAGS
  • account takeover
  • cyber attacks
  • cyber threats
  • engineering
  • ethical hacking
  • social
Previous articleHow to Configure Burp Suite Proxy With Google Chrome on macOS
Next articleTried & Tested Success Strategies For Coding Newbies
Hammad Mahmood

RELATED ARTICLESMORE FROM AUTHOR

How to Configure Burp Suite Proxy With Google Chrome on macOS

How to Configure Burp Suite Proxy With Google Chrome on macOS

5 Crucial Tips to Know If a Website is Fake or Legit

5 Crucial Tips to Know If a Website is Fake or Legit

How to Configure Burp Suite Proxy With Mozilla Firefox

How to Configure Burp Suite Proxy With Mozilla Firefox

Follow on Snapchat!

Follow us

10,338FansLike
1,680SubscribersSubscribe

Like what we do support us over here.

Buy me a coffeeBuy me a coffee

Top Posts

untursted host blocker for ios 12

Untrusted Host Blocker for iOS 12/11 [Ad Blocker]

Shaeel Iqbal - March 14, 2019 0
Here is all you need to know about Untrusted Host Blocker for iOS 12 and iOS 11. Are you one who is facing different ads...
filza escaped ios 12

Download FilzaEscaped iOS 12 Free [No Computer]

February 21, 2019
best tweaks for iphone xs max

Best Tweaks for iPhone XS Max | Chimera Jailbreak

May 9, 2019
rootless jailbreak iOS 12

Download Rootless Jailbreak for iOS 12 [No PC]

February 6, 2019

Burp Suite Tutorial Web Penetration Tool Kit

October 31, 2019
Why I Switched to Parrot OS?

Why I Switched to Parrot OS?

May 14, 2019

Accessing XAMPP PhpMyAdmin From Other Computers in LAN

January 6, 2020
unc0ver jailbreak ios 12

UnC0ver Jailbreak for iOS 12 by Pwn20wnd

February 19, 2019
Best Linux Distros for beginners

The 5 Best Linux Distros For Beginners in 2019

February 16, 2019
LINUX for Beginners

LINUX for Beginners

February 4, 2019
  • TheLinuxOS
  • Write For Us
  • Privacy Policy
  • Disclaimer
  • About Us
  • Contact US
© Copyrights TheLinuxOS.com 2019. All Rights Reserved.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version