Chapter 6

Preventing Social Engineering Attacks

IN THIS CHAPTER

Bullet Being aware of the various forms of social engineering attacks

Bullet Discovering the strategies that criminals use to craft effective social engineering attacks

Bullet Realizing how overshared information can help criminals

Bullet Protecting yourself and your loved ones from social engineering attacks

Most, if not all, major breaches that have occurred in recent years have involved some element of social engineering. Do not let devious criminals trick you or your loved ones. In this chapter, you find out how to protect yourself.

Don’t Trust Technology More than You Would People

Would you give your online banking password to a random stranger who asked for it after walking up to you in the street and telling you that they worked for your bank?

If the answer is no — which it certainly should be (and, if it is not, your security problems are much greater than just your cybersecurity) — you need to exercise the same lack of trust when it comes to technology. The fact that your computer shows you an email sent by some party that claims ...

Get Cybersecurity All-in-One For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.