One of today’s most effective cyber-attack methods is to take advantage of the human tendency to trust.
Social engineering, a form of psychological manipulation where an attacker cons users into divulging information or doing something they want the user to do, can occur through phone calls, email, text messaging, social media and online chats.
Indicators of social engineering attacks include:
A tremendous sense of urgency, or pressure to make a quick decision
Someone asking for information they should already know
Something too good to be true
To avoid social engineering attacks, never share your passwords and don’t share too much personal information on social media, which can give attackers information to mislead you. If someone asks for something personal, verify their contact information first.
These days, most of us can’t live without our cell phone. However, it can be dangerous to be attached to a device without knowing how it can be hacked. Some security concerns include dangerous app downloads and changes to default settings.
iPhones: WhileApple is known for tight security measures and therefore safer security measures on its cell phones, some users may be tempted to jailbreak their iPhones to get around restrictions. Jailbreaking is not recommended because it invalidates iPhone’s warranty, renders Apple’s security measures useless, can cause crashing and instability, and may even “brick” or freeze the phone.
Androids: To offer more freedom, Google allows users to download cell phone apps from outside the Play Store. But this opens users to risk, as attackers can try to distribute malicious apps.
Avoid apps from outside the Play Store
Scan apps outside the Play Store for malware before installing
Enable the “Verify Applications” setting to regularly scan for malicious apps (even apps from the Play Store)
Be suspicious of apps that ask for excess permissions