Social Engineering - The Real E-Terrorism?
2008-06-25来源:
One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. The technical support operator expressed an interest so the hacker sent him an e-mail with a photo of the car attached. When the operator opened the attachment it created a back door that opened a connection out of AOL's network, through the firewall, allowing the hacker full access to the entire internal network of AOL with very little effort on the hacker's part.The above is a true story and it is an excellent example of one of the biggest threats to an organisation's security - social engineering. It has been described as people hacking and it generally means persuading someone inside a company to volunteer information or assistance.Examples of techniques employed by hackers include:
相关文章
- How To Cover Your Tracks On The Internet
- Email Scams - Ten Simple Steps To Avoiding Them
- The Attack of the Advertiser - Spy Mother Spy
- 8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft
- How to Prevent Online Identity Theft
- How to Know Whether an Email is a Fake or Not
- Pharming - Another New Scam
- The Important Steps To Protect Your Kids on the Internet
- The Saga of the Annoying Adware
- Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER