SlideShare una empresa de Scribd logo
1 de 2
Sutton University:
Computers/Technical
      Virus attacks exploit human nature with ‘social engineering’

Before we get started with this issue, we want to acknowledge that in the previous issue of
tech tips we had planned on showing you more ways to increase the effectiveness of your
website. However, as we have had a number of questions recently sent to the support desk
about viruses, we thought we would sneak in this article out of sequence in order to help our
members stay informed and protected. We promise to return to our discussion on websites
in our next issue.

Social Engineering

Many of today’s computer viruses are using psychology to help them infect your computer.
Regularly updating your anti-virus software is still an important part of helping keep you safe
while computing, but a good dose of common sense can be even more beneficial. As
example take a look at the 3 email messages below:

Bank Example:

       “Dear Bank of Montreal member, we were informed that your card was used by
       another person or may possibly have been stolen. It may have happened if you had
       been shopping on-line, and someone gained access to your 'billing information'
       including your card number. To avoid and prevent any billing mistakes and to refund
       your credit card, it is strongly recommended to proceed by filling in the secure form
       on our site and applying for our Zero Liability program. This program is free and it
       will help us to investigate this accident."

Hot Gossip Example:

       “In a startling turn of events, this season’s winner of American Idol appears to be in
       danger of losing her title. Senior producers of the idol series spoke with CNN’s Paula
       Zhon, saying “…all contestants have signed contractual agreements regarding their
       full disclosure of any criminal records… and this type of behavior definitely qualifies
       as a significant breach of contract…” To get the full story, please click here.”


Computer Support Example:

       “Dear Sutton member, your email account has been temporarily suspended because
       of improper use. If you wish to restore your account, please access and return the
       attached file to support@sutton.com.”

Each of these actual messages had a seemingly legitimate email address (all of which were
faked), and some even had the corresponding company logo and colors incorporated into
the message formatting. However, each of these messages were not from the proclaimed
senders and were in fact efforts to transmit viruses!

What each of these messages has in common is their use of ‘social engineering’ – they are
constructed to look and sound authentic, and to either create concern or pique curiosity in
the reader in order to prompt a reader to take a course of action that they shouldn’t. In the
examples listed above, by clicking on the ‘secure form’, visiting the ‘company website’ or
opening up the attached file what the reader has just done is exposed their computer to a
virus!
Sutton University:
Computers/Technical
How to protect yourself from each example:

With the bank example – Whenever you get email requests for account information from
your bank, credit card company, PayPal or other similar source you should always seek
confirmation from the company that the email is in fact authentic. In this example, the email
is using fear to get you to act, combined with an authentic sounding ‘protection plan’ in an
effort to bolster the believability of the message. But no matter how believable a message
may sound, an unsolicited request for this type of personal information should always be
verified before responding to.

With the ‘hot gossip’ example – Whether it’s getting the latest details on a reality TV
scandal or promised nude celebrity pictures, hot topics have always been a staple tool that
virus creators have used for tempting people to visit a malicious site or open an infected
attachment.
As tempting as it may be to get the latest scoop, whenever you get these sorts of messages
you should always ask yourself, “Is the promised payoff of opening this message really
worth the risk of having to go to the manager and explain that you accidentally infected the
office network while trying to have a peek at pictures of Brad Pitt’s bare backside?”

With the Sutton Support example - Internet or email service providers rarely request a
password change via e-mail. And we will never ask you to send us any password
information via e-mail or attached form. If you are being requested to confirm or change
information, never use the link provided in the message.

These links are easy to fake – they may appear to be directing you to an authentic site, but
may actually direct you somewhere else that may compromise your computer. Always
request confirmation, especially before opening up an unexpected attachment.

In Summary:

Unless you are absolutely sure of a sender’s identity, never give out your personal
information like your credit card details, usernames or passwords. If you have any doubts at
all about the authenticity of the email then request confirmation.
If you are not sure about the sender of a strange attachment then you should avoid opening
these sorts of unsolicited email attachments. More likely than not they are infected with a
virus.

Whenever in doubt, seek confirmation. The small amount of extra effort will save you a lot of
headaches down the road.

Más contenido relacionado

Más de jonchung

Learn to control your reactions
Learn to control your reactionsLearn to control your reactions
Learn to control your reactionsjonchung
 
Eliminate can't
Eliminate can't Eliminate can't
Eliminate can't jonchung
 
Birth of salesperson
Birth of salespersonBirth of salesperson
Birth of salespersonjonchung
 
Power point moving a slide
Power point moving a slidePower point moving a slide
Power point moving a slidejonchung
 
Power point inserting a slide
Power point   inserting a slidePower point   inserting a slide
Power point inserting a slidejonchung
 
Power point deleting a slide
Power point   deleting a slidePower point   deleting a slide
Power point deleting a slidejonchung
 
Power point copying a slide
Power point   copying a slidePower point   copying a slide
Power point copying a slidejonchung
 
Outlook signature
Outlook signatureOutlook signature
Outlook signaturejonchung
 
Outlook contact
Outlook contactOutlook contact
Outlook contactjonchung
 
Generating leads on your website
Generating leads on your websiteGenerating leads on your website
Generating leads on your websitejonchung
 
Do people actually read your emails
Do people actually read your emailsDo people actually read your emails
Do people actually read your emailsjonchung
 
Your real estate resume
Your real estate resumeYour real estate resume
Your real estate resumejonchung
 
Your listing checklist
Your listing checklistYour listing checklist
Your listing checklistjonchung
 
Your client marketing presentation
Your client marketing presentationYour client marketing presentation
Your client marketing presentationjonchung
 
Using the media to your advantage
Using the media to your advantageUsing the media to your advantage
Using the media to your advantagejonchung
 
The upside of anger
The upside of angerThe upside of anger
The upside of angerjonchung
 
Selling your home
Selling your homeSelling your home
Selling your homejonchung
 
Sellers proposal
Sellers proposalSellers proposal
Sellers proposaljonchung
 
Qualifying clients
Qualifying clientsQualifying clients
Qualifying clientsjonchung
 
Pricing homes the_old_fashioned_way
Pricing homes the_old_fashioned_wayPricing homes the_old_fashioned_way
Pricing homes the_old_fashioned_wayjonchung
 

Más de jonchung (20)

Learn to control your reactions
Learn to control your reactionsLearn to control your reactions
Learn to control your reactions
 
Eliminate can't
Eliminate can't Eliminate can't
Eliminate can't
 
Birth of salesperson
Birth of salespersonBirth of salesperson
Birth of salesperson
 
Power point moving a slide
Power point moving a slidePower point moving a slide
Power point moving a slide
 
Power point inserting a slide
Power point   inserting a slidePower point   inserting a slide
Power point inserting a slide
 
Power point deleting a slide
Power point   deleting a slidePower point   deleting a slide
Power point deleting a slide
 
Power point copying a slide
Power point   copying a slidePower point   copying a slide
Power point copying a slide
 
Outlook signature
Outlook signatureOutlook signature
Outlook signature
 
Outlook contact
Outlook contactOutlook contact
Outlook contact
 
Generating leads on your website
Generating leads on your websiteGenerating leads on your website
Generating leads on your website
 
Do people actually read your emails
Do people actually read your emailsDo people actually read your emails
Do people actually read your emails
 
Your real estate resume
Your real estate resumeYour real estate resume
Your real estate resume
 
Your listing checklist
Your listing checklistYour listing checklist
Your listing checklist
 
Your client marketing presentation
Your client marketing presentationYour client marketing presentation
Your client marketing presentation
 
Using the media to your advantage
Using the media to your advantageUsing the media to your advantage
Using the media to your advantage
 
The upside of anger
The upside of angerThe upside of anger
The upside of anger
 
Selling your home
Selling your homeSelling your home
Selling your home
 
Sellers proposal
Sellers proposalSellers proposal
Sellers proposal
 
Qualifying clients
Qualifying clientsQualifying clients
Qualifying clients
 
Pricing homes the_old_fashioned_way
Pricing homes the_old_fashioned_wayPricing homes the_old_fashioned_way
Pricing homes the_old_fashioned_way
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Virus attacks exploit human nature with social engineering

  • 1. Sutton University: Computers/Technical Virus attacks exploit human nature with ‘social engineering’ Before we get started with this issue, we want to acknowledge that in the previous issue of tech tips we had planned on showing you more ways to increase the effectiveness of your website. However, as we have had a number of questions recently sent to the support desk about viruses, we thought we would sneak in this article out of sequence in order to help our members stay informed and protected. We promise to return to our discussion on websites in our next issue. Social Engineering Many of today’s computer viruses are using psychology to help them infect your computer. Regularly updating your anti-virus software is still an important part of helping keep you safe while computing, but a good dose of common sense can be even more beneficial. As example take a look at the 3 email messages below: Bank Example: “Dear Bank of Montreal member, we were informed that your card was used by another person or may possibly have been stolen. It may have happened if you had been shopping on-line, and someone gained access to your 'billing information' including your card number. To avoid and prevent any billing mistakes and to refund your credit card, it is strongly recommended to proceed by filling in the secure form on our site and applying for our Zero Liability program. This program is free and it will help us to investigate this accident." Hot Gossip Example: “In a startling turn of events, this season’s winner of American Idol appears to be in danger of losing her title. Senior producers of the idol series spoke with CNN’s Paula Zhon, saying “…all contestants have signed contractual agreements regarding their full disclosure of any criminal records… and this type of behavior definitely qualifies as a significant breach of contract…” To get the full story, please click here.” Computer Support Example: “Dear Sutton member, your email account has been temporarily suspended because of improper use. If you wish to restore your account, please access and return the attached file to support@sutton.com.” Each of these actual messages had a seemingly legitimate email address (all of which were faked), and some even had the corresponding company logo and colors incorporated into the message formatting. However, each of these messages were not from the proclaimed senders and were in fact efforts to transmit viruses! What each of these messages has in common is their use of ‘social engineering’ – they are constructed to look and sound authentic, and to either create concern or pique curiosity in the reader in order to prompt a reader to take a course of action that they shouldn’t. In the examples listed above, by clicking on the ‘secure form’, visiting the ‘company website’ or opening up the attached file what the reader has just done is exposed their computer to a virus!
  • 2. Sutton University: Computers/Technical How to protect yourself from each example: With the bank example – Whenever you get email requests for account information from your bank, credit card company, PayPal or other similar source you should always seek confirmation from the company that the email is in fact authentic. In this example, the email is using fear to get you to act, combined with an authentic sounding ‘protection plan’ in an effort to bolster the believability of the message. But no matter how believable a message may sound, an unsolicited request for this type of personal information should always be verified before responding to. With the ‘hot gossip’ example – Whether it’s getting the latest details on a reality TV scandal or promised nude celebrity pictures, hot topics have always been a staple tool that virus creators have used for tempting people to visit a malicious site or open an infected attachment. As tempting as it may be to get the latest scoop, whenever you get these sorts of messages you should always ask yourself, “Is the promised payoff of opening this message really worth the risk of having to go to the manager and explain that you accidentally infected the office network while trying to have a peek at pictures of Brad Pitt’s bare backside?” With the Sutton Support example - Internet or email service providers rarely request a password change via e-mail. And we will never ask you to send us any password information via e-mail or attached form. If you are being requested to confirm or change information, never use the link provided in the message. These links are easy to fake – they may appear to be directing you to an authentic site, but may actually direct you somewhere else that may compromise your computer. Always request confirmation, especially before opening up an unexpected attachment. In Summary: Unless you are absolutely sure of a sender’s identity, never give out your personal information like your credit card details, usernames or passwords. If you have any doubts at all about the authenticity of the email then request confirmation. If you are not sure about the sender of a strange attachment then you should avoid opening these sorts of unsolicited email attachments. More likely than not they are infected with a virus. Whenever in doubt, seek confirmation. The small amount of extra effort will save you a lot of headaches down the road.