Social engineering (security)

[3] Social engineering attacks have been increasing in intensity and number, cementing the need for novel detection techniques and cyber security educational programs.

[5][6] One example of social engineering is an individual who walks into a building and posts an official-looking announcement to the company bulletin that says the number for the help desk has changed.

So, when employees call for help the individual asks them for their passwords and IDs thereby gaining the ability to access the company's private information.

[9] An elaborate lie, it most often involves some prior research or setup and the use of this information for impersonation (e.g., date of birth, Social Security number, last bill amount) to establish legitimacy in the mind of the target.

[10] Water holing is a targeted social engineering strategy that capitalizes on the trust users have in websites they regularly visit.

A "road apple" (the colloquial term for horse manure, suggesting the device's undesirable nature) is any removable media with malicious software left in opportunistic or conspicuous places.

This federal agency has the obligation and authority to ensure that consumers are not subjected to any unfair or deceptive business practices.

The Florida-based company operates several Web sites that sell mobile telephone records, according to a copy of the suit.

The attorneys general of Florida and Missouri quickly followed Madigan's lead, filing suits respectively, against 1st Source Information Specialists and, in Missouri's case, one other records broker – First Data Solutions, Inc. Several wireless providers, including T-Mobile, Verizon, and Cingular filed earlier lawsuits against records brokers, with Cingular winning an injunction against First Data Solutions and 1st Source Information Specialists.

Senator Charles Schumer (D-New York) introduced legislation in February 2006 aimed at curbing the practice.

Dunn acknowledged that the company used the practice of pretexting to solicit the telephone records of board members and journalists.

[23][24] During the 2016 United States Elections, hackers associated with Russian Military Intelligence (GRU) sent phishing emails directed to members of Hillary Clinton's campaign, disguised as a Google alert.

[25] Many members, including the chairman of the campaign, John Podesta, had entered their passwords thinking it would be reset, causing their personal information, and thousands of private emails and documents to be leaked.

[28] On 24 November 2014, the hacker group "Guardians of Peace"[29] (probably linked to North Korea)[30] leaked confidential data from the film studio Sony Pictures Entertainment.

He became well known for live demonstrations as well as playing recorded calls after talks where he explained his thought process on what he was doing to get passwords through the phone.

He is best known as an author of 4 books on social engineering and cyber security[42][43][44][45] and founder of Innocent Lives Foundation, an organization that helps tracking and identifying child trafficking by seeking the assistance of information security specialists, using data from open-source intelligence (OSINT) and collaborating with law enforcement.

Definition of Social Engineering in Layman's Terms
OPSEC alert
vectorial version
vectorial version