Knowledge Is Your Best Defense.: Cybercriminals YOU
The document discusses how to recognize and combat social engineering attempts. It provides examples of tactics that social engineers use to manipulate people, such as pretending to be someone else, making things seem urgent, and refusing to provide proof of identity. The document also gives advice on how to protect yourself, such as verifying identities, being wary of pressure tactics, and escalating any suspicious situations.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
134 views1 page
Knowledge Is Your Best Defense.: Cybercriminals YOU
The document discusses how to recognize and combat social engineering attempts. It provides examples of tactics that social engineers use to manipulate people, such as pretending to be someone else, making things seem urgent, and refusing to provide proof of identity. The document also gives advice on how to protect yourself, such as verifying identities, being wary of pressure tactics, and escalating any suspicious situations.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1
Knowledge is your best defense.
Recognize and Combat Social Engineering
CYBERCRIMINALS YOU
Want access to something sensitive Examine all links and attachments
They want your boss’s information or the number of an account, or You may receive innocent-looking links or attachments which actually even want to get into the building. Stand firm and ask for proof of contain malware; examine carefully and don’t click unless you’re identification. certain it’s safe.
Exert pressure on you Don’t use their contact methods
Social engineers want you to act without thinking. If someone is If a message might be from an impostor, contact the real person or pressuring you to do something without giving you time to consider it, organization through a known, safe method, such as a public phone that’s a sign of a social engineer. number.
Send offers too good to be true Escalate
You’ve won the lottery! Or not. If an offer or opportunity seems too If someone’s story sounds fishy or they can’t prove who they are, pass good to be true — it probably is. the issue — and your concerns — up the chain of command.
Pretend to be a client or authority figure Don’t let yourself be bullied
Social engineers will impersonate clients, bosses, friends, family or Social engineers may try to intimidate, emotionally blackmail or others who may be able to influence you. Always take extra steps to threaten you. Don’t let it faze you. prove their identity!
Don’t share information an attacker could use
Are unwilling to prove identity If you share personal or sensitive information online, an attacker can A social engineer will often deflect or get angry when asked to prove harvest it for use in impersonation or attacks. their identity. They may try to stop you from contacting other people for verification or refuse to give proof.
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<HTML><HEAD><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<TITLE>ERROR: The requested URL could not be retrieved</TITLE>
<STYLE type="text/css"><!--BODY{background-color:#ffffff;font-family:verdana,sans-serif}PRE{font-family:sans-serif}--></STYLE>
</HEAD><BODY>
<H1>ERROR</H1>
<H2>The requested URL could not be retrieved</H2>
<HR noshade size="1px">
<P>
While trying to process the request:
<PRE>
TEXT http://www.scribd.com/titlecleaner?title=CyberCrime+Report.docx HTTP/1.1
Host: www.scribd.com
Proxy-Connection: keep-alive
Accept: */*
Origin: http://www.scribd.com
X-CSRF-Token: ea5b3d74fc35283c15ef440947b36a61b715cffd
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.64 Safari/537.31
X-Requested-With: XMLHttpRequest
Referer: http://www.scribd.com/upload-document
Accept-Encoding: gzip,defl