Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
security:start [2021/03/25 09:18] – Improve formatting stefan | security:start [2021/03/25 09:40] – [Social engineering] Expand section stefan | ||
---|---|---|---|
Line 23: | Line 23: | ||
==== Social engineering ==== | ==== Social engineering ==== | ||
- | For social engineering attacks, | + | According to Wikipedia, "social engineering |
+ | |||
+ | Here are some basic techniques to protect against this: | ||
+ | |||
+ | * Be wary of anyone contacting you out of the blue asking " | ||
+ | * Never reply to requests for personal information or passwords. No one will ever legitimately ask you for your password, not even for verification of your identity. | ||
+ | * Reject requests for help or offers of help. An attacker might pose as technical support and offer to " | ||
+ | * "Break the loop". Most attacks | ||
+ | * Ask for verification of identity. Research it, and don't trust it blindly. | ||
+ | * All offers and prizes or sent to you are fake. ("Get the latest iPhone for only 200 euros", | ||
+ | |||
+ | Pay attention to how you react to something. More often than not these attacks will try to elicit an emotional response and then exploit your impulses. |