Chapter 8

Preventing Social Engineering

IN THIS CHAPTER

check Being aware of the various forms of social engineering attacks

check Discovering the strategies that criminals use to craft effective attacks

check Realizing how overshared information can help criminals

check Recognizing phony social media accounts

check Protecting yourself and your loved ones from social engineering attacks

Most, if not all, major breaches that have occurred in recent years have involved some element of social engineering. Do not let devious criminals trick you or your loved ones. In this chapter, you find out how to protect yourself

Don’t Trust Technology More than You Would People

Would you give your online banking password to a random stranger who asked for it after walking up to you in the street and telling you that he worked for your bank?

If the answer is no — which it certainly should be — you need to exercise the same lack of trust when it comes to technology. The fact that your computer shows you an email sent by ...

Get Cybersecurity For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.