SlideShare una empresa de Scribd logo
1 de 2
Sutton University:
Computers/Technical
      Virus attacks exploit human nature with ‘social engineering’

Before we get started with this issue, we want to acknowledge that in the previous issue of
tech tips we had planned on showing you more ways to increase the effectiveness of your
website. However, as we have had a number of questions recently sent to the support desk
about viruses, we thought we would sneak in this article out of sequence in order to help our
members stay informed and protected. We promise to return to our discussion on websites
in our next issue.

Social Engineering

Many of today’s computer viruses are using psychology to help them infect your computer.
Regularly updating your anti-virus software is still an important part of helping keep you safe
while computing, but a good dose of common sense can be even more beneficial. As
example take a look at the 3 email messages below:

Bank Example:

       “Dear Bank of Montreal member, we were informed that your card was used by
       another person or may possibly have been stolen. It may have happened if you had
       been shopping on-line, and someone gained access to your 'billing information'
       including your card number. To avoid and prevent any billing mistakes and to refund
       your credit card, it is strongly recommended to proceed by filling in the secure form
       on our site and applying for our Zero Liability program. This program is free and it
       will help us to investigate this accident."

Hot Gossip Example:

       “In a startling turn of events, this season’s winner of American Idol appears to be in
       danger of losing her title. Senior producers of the idol series spoke with CNN’s Paula
       Zhon, saying “…all contestants have signed contractual agreements regarding their
       full disclosure of any criminal records… and this type of behavior definitely qualifies
       as a significant breach of contract…” To get the full story, please click here.”


Computer Support Example:

       “Dear Sutton member, your email account has been temporarily suspended because
       of improper use. If you wish to restore your account, please access and return the
       attached file to support@sutton.com.”

Each of these actual messages had a seemingly legitimate email address (all of which were
faked), and some even had the corresponding company logo and colors incorporated into
the message formatting. However, each of these messages were not from the proclaimed
senders and were in fact efforts to transmit viruses!

What each of these messages has in common is their use of ‘social engineering’ – they are
constructed to look and sound authentic, and to either create concern or pique curiosity in
the reader in order to prompt a reader to take a course of action that they shouldn’t. In the
examples listed above, by clicking on the ‘secure form’, visiting the ‘company website’ or
opening up the attached file what the reader has just done is exposed their computer to a
virus!
Sutton University:
Computers/Technical
How to protect yourself from each example:

With the bank example – Whenever you get email requests for account information from
your bank, credit card company, PayPal or other similar source you should always seek
confirmation from the company that the email is in fact authentic. In this example, the email
is using fear to get you to act, combined with an authentic sounding ‘protection plan’ in an
effort to bolster the believability of the message. But no matter how believable a message
may sound, an unsolicited request for this type of personal information should always be
verified before responding to.

With the ‘hot gossip’ example – Whether it’s getting the latest details on a reality TV
scandal or promised nude celebrity pictures, hot topics have always been a staple tool that
virus creators have used for tempting people to visit a malicious site or open an infected
attachment.
As tempting as it may be to get the latest scoop, whenever you get these sorts of messages
you should always ask yourself, “Is the promised payoff of opening this message really
worth the risk of having to go to the manager and explain that you accidentally infected the
office network while trying to have a peek at pictures of Brad Pitt’s bare backside?”

With the Sutton Support example - Internet or email service providers rarely request a
password change via e-mail. And we will never ask you to send us any password
information via e-mail or attached form. If you are being requested to confirm or change
information, never use the link provided in the message.

These links are easy to fake – they may appear to be directing you to an authentic site, but
may actually direct you somewhere else that may compromise your computer. Always
request confirmation, especially before opening up an unexpected attachment.

In Summary:

Unless you are absolutely sure of a sender’s identity, never give out your personal
information like your credit card details, usernames or passwords. If you have any doubts at
all about the authenticity of the email then request confirmation.
If you are not sure about the sender of a strange attachment then you should avoid opening
these sorts of unsolicited email attachments. More likely than not they are infected with a
virus.

Whenever in doubt, seek confirmation. The small amount of extra effort will save you a lot of
headaches down the road.

Más contenido relacionado

Más de jonchung

Learn to control your reactions
Learn to control your reactionsLearn to control your reactions
Learn to control your reactionsjonchung
 
Eliminate can't
Eliminate can't Eliminate can't
Eliminate can't jonchung
 
Birth of salesperson
Birth of salespersonBirth of salesperson
Birth of salespersonjonchung
 
Power point moving a slide
Power point moving a slidePower point moving a slide
Power point moving a slidejonchung
 
Power point inserting a slide
Power point   inserting a slidePower point   inserting a slide
Power point inserting a slidejonchung
 
Power point deleting a slide
Power point   deleting a slidePower point   deleting a slide
Power point deleting a slidejonchung
 
Power point copying a slide
Power point   copying a slidePower point   copying a slide
Power point copying a slidejonchung
 
Outlook signature
Outlook signatureOutlook signature
Outlook signaturejonchung
 
Outlook contact
Outlook contactOutlook contact
Outlook contactjonchung
 
Generating leads on your website
Generating leads on your websiteGenerating leads on your website
Generating leads on your websitejonchung
 
Do people actually read your emails
Do people actually read your emailsDo people actually read your emails
Do people actually read your emailsjonchung
 
Your real estate resume
Your real estate resumeYour real estate resume
Your real estate resumejonchung
 
Your listing checklist
Your listing checklistYour listing checklist
Your listing checklistjonchung
 
Your client marketing presentation
Your client marketing presentationYour client marketing presentation
Your client marketing presentationjonchung
 
Using the media to your advantage
Using the media to your advantageUsing the media to your advantage
Using the media to your advantagejonchung
 
The upside of anger
The upside of angerThe upside of anger
The upside of angerjonchung
 
Selling your home
Selling your homeSelling your home
Selling your homejonchung
 
Sellers proposal
Sellers proposalSellers proposal
Sellers proposaljonchung
 
Qualifying clients
Qualifying clientsQualifying clients
Qualifying clientsjonchung
 
Pricing homes the_old_fashioned_way
Pricing homes the_old_fashioned_wayPricing homes the_old_fashioned_way
Pricing homes the_old_fashioned_wayjonchung
 

Más de jonchung (20)

Learn to control your reactions
Learn to control your reactionsLearn to control your reactions
Learn to control your reactions
 
Eliminate can't
Eliminate can't Eliminate can't
Eliminate can't
 
Birth of salesperson
Birth of salespersonBirth of salesperson
Birth of salesperson
 
Power point moving a slide
Power point moving a slidePower point moving a slide
Power point moving a slide
 
Power point inserting a slide
Power point   inserting a slidePower point   inserting a slide
Power point inserting a slide
 
Power point deleting a slide
Power point   deleting a slidePower point   deleting a slide
Power point deleting a slide
 
Power point copying a slide
Power point   copying a slidePower point   copying a slide
Power point copying a slide
 
Outlook signature
Outlook signatureOutlook signature
Outlook signature
 
Outlook contact
Outlook contactOutlook contact
Outlook contact
 
Generating leads on your website
Generating leads on your websiteGenerating leads on your website
Generating leads on your website
 
Do people actually read your emails
Do people actually read your emailsDo people actually read your emails
Do people actually read your emails
 
Your real estate resume
Your real estate resumeYour real estate resume
Your real estate resume
 
Your listing checklist
Your listing checklistYour listing checklist
Your listing checklist
 
Your client marketing presentation
Your client marketing presentationYour client marketing presentation
Your client marketing presentation
 
Using the media to your advantage
Using the media to your advantageUsing the media to your advantage
Using the media to your advantage
 
The upside of anger
The upside of angerThe upside of anger
The upside of anger
 
Selling your home
Selling your homeSelling your home
Selling your home
 
Sellers proposal
Sellers proposalSellers proposal
Sellers proposal
 
Qualifying clients
Qualifying clientsQualifying clients
Qualifying clients
 
Pricing homes the_old_fashioned_way
Pricing homes the_old_fashioned_wayPricing homes the_old_fashioned_way
Pricing homes the_old_fashioned_way
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Virus attacks exploit human nature with social engineering

  • 1. Sutton University: Computers/Technical Virus attacks exploit human nature with ‘social engineering’ Before we get started with this issue, we want to acknowledge that in the previous issue of tech tips we had planned on showing you more ways to increase the effectiveness of your website. However, as we have had a number of questions recently sent to the support desk about viruses, we thought we would sneak in this article out of sequence in order to help our members stay informed and protected. We promise to return to our discussion on websites in our next issue. Social Engineering Many of today’s computer viruses are using psychology to help them infect your computer. Regularly updating your anti-virus software is still an important part of helping keep you safe while computing, but a good dose of common sense can be even more beneficial. As example take a look at the 3 email messages below: Bank Example: “Dear Bank of Montreal member, we were informed that your card was used by another person or may possibly have been stolen. It may have happened if you had been shopping on-line, and someone gained access to your 'billing information' including your card number. To avoid and prevent any billing mistakes and to refund your credit card, it is strongly recommended to proceed by filling in the secure form on our site and applying for our Zero Liability program. This program is free and it will help us to investigate this accident." Hot Gossip Example: “In a startling turn of events, this season’s winner of American Idol appears to be in danger of losing her title. Senior producers of the idol series spoke with CNN’s Paula Zhon, saying “…all contestants have signed contractual agreements regarding their full disclosure of any criminal records… and this type of behavior definitely qualifies as a significant breach of contract…” To get the full story, please click here.” Computer Support Example: “Dear Sutton member, your email account has been temporarily suspended because of improper use. If you wish to restore your account, please access and return the attached file to support@sutton.com.” Each of these actual messages had a seemingly legitimate email address (all of which were faked), and some even had the corresponding company logo and colors incorporated into the message formatting. However, each of these messages were not from the proclaimed senders and were in fact efforts to transmit viruses! What each of these messages has in common is their use of ‘social engineering’ – they are constructed to look and sound authentic, and to either create concern or pique curiosity in the reader in order to prompt a reader to take a course of action that they shouldn’t. In the examples listed above, by clicking on the ‘secure form’, visiting the ‘company website’ or opening up the attached file what the reader has just done is exposed their computer to a virus!
  • 2. Sutton University: Computers/Technical How to protect yourself from each example: With the bank example – Whenever you get email requests for account information from your bank, credit card company, PayPal or other similar source you should always seek confirmation from the company that the email is in fact authentic. In this example, the email is using fear to get you to act, combined with an authentic sounding ‘protection plan’ in an effort to bolster the believability of the message. But no matter how believable a message may sound, an unsolicited request for this type of personal information should always be verified before responding to. With the ‘hot gossip’ example – Whether it’s getting the latest details on a reality TV scandal or promised nude celebrity pictures, hot topics have always been a staple tool that virus creators have used for tempting people to visit a malicious site or open an infected attachment. As tempting as it may be to get the latest scoop, whenever you get these sorts of messages you should always ask yourself, “Is the promised payoff of opening this message really worth the risk of having to go to the manager and explain that you accidentally infected the office network while trying to have a peek at pictures of Brad Pitt’s bare backside?” With the Sutton Support example - Internet or email service providers rarely request a password change via e-mail. And we will never ask you to send us any password information via e-mail or attached form. If you are being requested to confirm or change information, never use the link provided in the message. These links are easy to fake – they may appear to be directing you to an authentic site, but may actually direct you somewhere else that may compromise your computer. Always request confirmation, especially before opening up an unexpected attachment. In Summary: Unless you are absolutely sure of a sender’s identity, never give out your personal information like your credit card details, usernames or passwords. If you have any doubts at all about the authenticity of the email then request confirmation. If you are not sure about the sender of a strange attachment then you should avoid opening these sorts of unsolicited email attachments. More likely than not they are infected with a virus. Whenever in doubt, seek confirmation. The small amount of extra effort will save you a lot of headaches down the road.