Monday, August 3, 2015

#NoHacked: How to recognise and protect yourself against social engineering

#NoHacked: How to recognise and protect yourself against social engineering

#NoHacked: How to recognise and protect yourself against social engineering
Monday, August 3, 2015
#NoHacked: How to recognise and protect yourself against social engineering - Hallo TRENDING NEWS, In the article that you are reading this time with the title #NoHacked: How to recognise and protect yourself against social engineering, we have prepared this article well for you to read and take the information in it. hopefully the contents of the post what we write you can understand. all right, have a nice reading.

Title : #NoHacked: How to recognise and protect yourself against social engineering
link : #NoHacked: How to recognise and protect yourself against social engineering

Related Post


#NoHacked: How to recognise and protect yourself against social engineering

Today in our #NoHacked campaign, we’ll be talking about social engineering. Follow along with discussions on Twitter and Google+ using the #nohacked hashtag. (Part 1)
If you’ve spent some time on the web, you have more than likely encountered some form of social engineering. Social engineering attempts to extract confidential information from you by manipulating or tricking you in some way.

Phishing

You might be familiar with phishing, one of the most common forms of social engineering. Phishing sites and emails mimic legitimate sites and trick you into entering confidential information like your username and password into these sites. A recent study from Google found that some phishing sites can trick victims 45% of the time! Once a phishing site has your information, the information will either be sold or be used to manipulate your accounts. the owners will either sell it or use it to manipulate your accounts.

Other Forms of Social Engineering 

As a site owner, phishing isn’t the only form of social engineering that you need to watch out for. One other form of social engineering comes from the software and tools used on your site. If you download or use any Content Management System (CMS), plug-ins, or add-ons, make sure that they come from reputable sources like directly from the developer’s site. Software from non-reputable sites can contain malicious exploits that allow hackers to gain access to your site.

For example, Webmaster Wanda was recently hired by Brandon’s Pet Palace to help create a site. After sketching some designs, Wanda starts compiling the software she needs to build the site. However, she finds out that Photo Frame Beautifier, one of her favorite plug-ins, has been taken off the official CMS plug-in site and that the developer has decided to stop supporting the plug-in. She does a quick search and finds a site that offers an archive of old plug-ins. She downloads the plug-in and uses it to finish the site. Two months later, a notification in Search Console notifies Wanda that her client’s site has been hacked. She quickly scrambles to fix the hacked content and finds the source of the compromise. It turns out the Photo Frame Beautifier plug-in was modified by a third party to allow malicious parties to access the site. She removed the plug-in, fixed the hacked content, secured her site from future attacks, and filed a reconsideration request in Search Console. As you can see, an inadvertent oversight by Wanda led to her client's site being compromised.

Protecting Yourself from Social Engineering Attacks

Social engineering is effective because it’s not obvious that there’s something wrong with what you’re doing. However, there are a few basic things you can do protect yourself from social engineering.
  • Stay vigilant: Whenever you enter confidential information online or install website software, have a healthy dose of skepticism. Check URLs to make sure you’re not typing confidential information into malicious sites. When installing website software make sure the software is coming from known, reputable sources like the developer’s site. 
  • Use two-factor authentication: Two-factor authentication like Google’s 2-Step Verification adds another layer of security that helps protect your account even if your password has been stolen. You should use two-factor authentication on all accounts where possible. We’ll be talking more in-depth next week about the benefits of two-factor authentication. 
Additional resources about social engineering:

If you have any additional questions, you can post in the Webmaster Help Forums where a community of webmasters can help answer your questions. You can also join our Hangout on Air about Security on August 26.



Thus the article #NoHacked: How to recognise and protect yourself against social engineering

That's the article #NoHacked: How to recognise and protect yourself against social engineering this time, hopefully it can be of benefit to all of you. well, see you in another article post.

You are now reading the article #NoHacked: How to recognise and protect yourself against social engineering with the link address https://poccoll.blogspot.com/2015/08/nohacked-how-to-recognise-and-protect.html
#NoHacked: How to recognise and protect yourself against social engineering
4/ 5
Oleh

No comments: