ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Arrival 2016 HDCAM x264 AC3-TuttyFruity
View Torrent Info: Hacksaw Ridge 2016 HDCAM x264 AC3-TuttyFruity
View Torrent Info: Keeping.Up.With.The.Joneses.2016.HDCAM.x264.AAC - Lesnar
View Torrent Info: The.Girl.on.the.Train.2016.NEW.CAM.XViD.AC3-ETRG
Hot torrents
XVID DIVX
View Torrent Info: Yoga.Hosers.2016.BRRip.XviD.AC3-EVO
View Torrent Info: Solitary.2015.HDRip.XViD-ETRG
View Torrent Info: Loving.2016.HC.HDRip.XviD.AC3-EVO
View Torrent Info: Officer.Downe.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: Morris.From.America.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Finding.Dory.2016.1080p.BluRay.AC3.x264-ETRG
View Torrent Info: Yoga.Hosers.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: [ 18] Los.Ritos.Sexuales.Del.Diablo.1982.720p.BRRip.x264.AAC-ETRG
Hot torrents
Television
View Torrent Info: The.Exorcist.S01E08.WEB-DL.x264-FUM[ettv]
View Torrent Info: Van.Helsing.S01E10.WEB-DL.x264-FUM[ettv]
View Torrent Info: Z.Nation.S03E10.WEB-DL.x264-FUM[ettv]
View Torrent Info: The.Vampire.Diaries.S08E05.HDTV.x264-LOL[ettv]
View Torrent Info: Finding.Dory.2016.720p.BluRay.AC3.x264.Greek-ETRG
View Torrent Info: Force 2 (2016) 720p - DesiSCR - x264 - AC3 - [DDR]
View Torrent Info: Now.You.See.Me.2.2016.1080p.BRRip.x264.Turkish.AC3-ETRG
View Torrent Info: Tum Bin 2 (2016) DesiSCR 1CDRIP x264 AAC [DDR]
30s
Chat
To add new messages please Login or Register for FREE
Warning! Stop Government from Tracking Your Torrenting!
Your IP Address is 24.62.246.85.   Location is United States
Your Internet Provider and Government can track your internet activity! Hide your IP ADDRESS and LOCATION with a VPN
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!


Social engineering Crimes of the century


Post a Reply    Subscribe to Topic    
AuthorMessage
No avatar
Posted: Wed Dec 19, 2007 17:35
Author: Blocked
Social engineering means using deception and manipulation to obtain confidential information. It is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it.

In computer security, social engineering is generally a hacker's clever manipulation of the natural human tendency to trust. The hacker's goal is to obtain information that will gain him/her unauthorized access to a system and the information that resides on that system. Typical examples of social engineering are phishing emails or pharming sites.

One example of malware using social engineering tricks is Skype Defender that was discovered in October 2007. The malware poses as a security plug-in. Infected users are prompted to log into their Skype accounts. Cleverly the Trojan displays what looks like a Skype login screen and if a user enters his Skype username and password, the Trojan displays a message saying that the name and password are unrecognized. Behind the scenes, this information - as well as all usernames and passwords saved in Internet Explorer - is sent to a hacker-controlled Web site.

Another example is the Storm Worm that infected computers worldwide throughout 2007. According to a security study, the Storm Worm's creators "released thousands of variants and changed coding techniques, infection methods and social engineering schemes far more than any other threat in history" and "created the largest peer-to-peer botnet ever." Experts said that the Storm Worm's creators had been very adept at crafting socially engineered messages persuasive enough or tempting enough to get people to launch files or click on links.
Experts warn that attacks are shifting from technology to social engineering. In the last half of 2007 phishing attacks increased around 500 percent and targeted Trojans increased by 150 percent.

"It shouldn't come as any surprise that, as we improve the security of the operating systems and the infrastructure on the internet, the attacks are moving to applications and social engineering, including phishing scams," said a Microsoft vice president speaking at a security conference in October 2007.

Post a Reply    

Forum Search


  search in post message
  search in topic subject
Forum


Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc4