top of page

Forum Posts

SK Sakib
Apr 03, 2022
In Money Saving Forum
These principles have been identified by marketing professor Robert Cialdini as: reciprocity, scarcity, authority, commitment and consistency, sympathy, social proof, and unit. So these are the building blocks for the cyber criminals ' social engineering . Knowledge is Whatsapp Number List power The first thing cyber criminals do is gather information about the victim. So about you. The Internet makes this 'market research' simple. Just google your name: a wealth of useful clues will immediately appear. For example, think of your position, the company where you work and your contact details. The pages found on social media are particularly useful. The scammer often also finds information about your colleagues, interests, hobbies or family Whatsapp Number List composition there. A cybercriminal can also do 'fun' things with your professional profile picture. Also read: Criminals in lockdown: explosive growth in identity fraud via WhatsApp Naturally, the Chamber of Commerce also offers useful starting points. The more concrete and specific the information, the better the criminal will be able to trick you. Example: the bank employee Now he has you clear in his sights. It's time to open the trap. Let's take a look at a common technique: the phone call. We all know the 'Microsoft employee' with an Indian accent, who wants to take over your PC remotely. But at the moment, cybercriminals like to pretend to be bank employees. If the criminal appears to be calling via the bank's number ( spoofing ), it immediately looks very convincing. Even more so if he turns out to know where you've been shopping the past week. He tells you that strange activity has been reported on your account.
0
0
1
Forum Posts: Members_Page

SK Sakib

More actions
bottom of page