Chapter 8
Preventing Social Engineering
IN THIS CHAPTER
Being aware of the various forms of social engineering attacks
Discovering the strategies that criminals use to craft effective attacks
Realizing how overshared information can help criminals
Recognizing phony social media accounts
Protecting yourself and your loved ones from social engineering attacks
Most, if not all, major breaches that have occurred in recent years have involved some element of social engineering. Do not let devious criminals trick you or your loved ones. In this chapter, you find out how to protect yourself
Don’t Trust Technology More than You Would People
Would you give your online banking password to a random stranger who asked for it after walking up to you in the street and telling you that he worked for your bank?
If the answer is no — which it certainly should be — you need to exercise the same lack of trust when it comes to technology. The fact that your computer shows you an email sent by ...
Get Cybersecurity For Dummies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.