Attacks based on social engineering

Cybercriminals have found great benefits in social engineering and use it to generate various types of attacks.

ingenieria social

Phishing
They impersonate individuals or organizations to make calls, send messages via email and social networks or create fake web pages in order to steal information.

Vishing
They replicate the collection recording of a bank or department store with the purpose of defrauding people.

Baiting
A USB or hard drive infected by a malicious program is intentionally left behind, with the aim of a person connecting it to their personal or corporate computer. This allows the cybercriminal to access your personal or work information.

Shoulder surfing
The victim is spied on while entering passwords or reviewing sensitive or confidential information.

Pretexting
They create a false situation or story where they involve the victim to provide personal or work information, which in normal situations he/she would not share.

Smishing
They send SMS messages asking the victim to call a number or access a link. In this way their personal data, passwords or other confidential information is collected.

Trashing
They search for private information of individuals or organizations by going through their garbage. With this data they create a more successful attack profile.

Recognizing these social engineering techniques will give you a head start on NOT becoming another victim.

ingenieria_social_blog