Tuesday, January 19, 2021

cyber security engineer careers

 What is social engineering and why is the approach to cybersecurity changing?


This concept, which specifically refers to the modality through which the attacker makes a detailed follow-up of the victim, collecting information and looking for a space outside the increasingly elaborate computer security systems, human psychology.


The social engineer uses the study of users' digital consumption to create a profile of the victim, but also pays special attention to their daily behavior outside the technological environment: going out to restaurants, shopping centers or any recurring or predictable activity.


The offender's ability consists of converting the data obtained into opportunities to attack, through techniques that generate curiosity, a sense of urgency or fear in the possible victims, according to their profile and according to the information they want to obtain.


TOO GOOD TO BE TRUE

Have you received invitations or "promotions" in which they offer you access to free movie or music streaming services? Surely. Believe it or not, this is still an effective way to collect personal and business data.


Now, imagine that this is just a random attempt by cybercriminals. Social engineering goes one step further and generates segmented actions aimed at capturing the data of a certain person through:


Wifi access points

Phone calls

Instant messaging and SMS

External USB memory

THE PHISHING

It is the most effective modality of social engineering attacks. It is about the theft of data, credentials and passwords through malicious emails in which impersonating brands, people and even job profiles, with a click of the victim can generate the installation of malware, freezing the system as part of an attack of ransomware or the theft of confidential information.


"91% of cyberattacks start with a spear phishing email"


CYBER CRIME AS A SERVICE

It is such a profitable business that there is currently a criminal environment dedicated to creating and providing phishing attacks, using global botnets to avoid the use of suspicious IP ranges, in the best style of the most sophisticated marketing strategies. In many cases with better results.


This is how we are beginning to see BEC (Business Email compromise) scams, a dangerous new subset of phishing attacks that allows attackers to expand their profits by targeting high-value corporate targets cyber security engineer careers.


TRACKING LEVEL (CLICS) OF PHISHING EMAILS

social engineering


Source: Verizon 2016 DBIR & Experian Email Benchmark Report Q4 2016


Signs to watch out for to discover potential phishing attempts, take note:


No comments:

Post a Comment

How can I get free backlinks?

technology write for us technology write for us technology write for us technology write for us technology write for us technology writ...