Android
Mac & iOS
Network Security
Data & Privacy
Anti Scam and Spam
Browser Protection
One fine body…
Estimated reading time: 6 minutes
In this guide, you will learn:
Social Engineering uses human interaction and manipulation to gain access to your sensitive private/personal information. Online crooks deceive users to get hands on your money. It covers a scope of tricks cybercriminals use to make people do things they do not want to. The driving force behind this, of course, is profit.
Threat actors use social engineering to disguise themselves and their motives, often by acting as trusted individuals.
Because these attacks come in many different shapes and sizes — and rely on human fallibility — it can be very hard to identify social engineering attacks. Nonetheless, if you encounter any of the below, be warned that these are major red flags and suggest a social engineering attack is commencing:
Here are the key social engineering attacks to be aware of:
Phishing uses email and text messaging to lure victims into clicking on malicious attachments or links to harmful websites.
Baiting uses a false promise to tempt victims via greed or interest. For example, malicious attackers leave a malware-infected flash drive, or a bait, in a public place. A potential victim may be interested in its contents and insert it into their device, unwittingly installing malware.
Pretexting: In this attack, one actor lies to another to gain access to data. For example, an attacker may pretend to need financial or personal data to confirm the identity of the recipient.
Scareware involves victims being scared with false alarms and threats. Users might be deceived into thinking that their system is infected with malware. They, then, install the suggested software fix — but this software may be the malware itself, for example, a virus or spyware. Common examples are pop-up banners appearing in your browser, displaying text like “Your computer may be infected.” It will offer to install the fix, or will direct you to a malicious website.
Like phishing, but the attack is specifically targeted at a particular individual or organization. Similarly, whaling attacks target high-profile employees, such as CEOs and directors.
Also known as piggybacking, tailgating is when an attacker walks into a secure building or office department by following someone with an access card. This attack presumes others will assume the attacker is allowed to be there.
AI-based scams leverage artificial intelligence technology to deceive victims. Here are the common types:
Aside from keeping an eye out for warning signs, the following are best practices to follow:
Install Trend Micro Maximum Security to stop malware, fraud, phishing, email hacking, and other targeted attacks on your PC and online accounts. Get the same protection for your mobile with Trend Micro Mobile Security for Android and Trend Micro Mobile Security for iOS.
Discover how to protect yourself from scams, online fraud, and dive into essential topics to protect your digital identity, and care for your devices.
Visit our 👉 Cybersecurity Learning Center! 👈