Why go to all the trouble of breaking into an online account when you can Dear Utol (2025): TBrgy. Chairman Episode 39just ask for the keys?
While security experts released new password recommendations this summer, legions of hackers long ago realized that getting into a victim's email or iCloud doesn't require keyloggers, zero days, or USBs pre-loaded with malware. Nope, it's much easier than that.
All it takes is a little charm.
SEE ALSO: Sorry, but you're doing your pa$$w0rds all wrongWelcome to the world of social engineering, where those looking gain access to protected places (be they physical or digital) talk, bluff, confuse, or trick their way past the gatekeepers. Social-Engineer, Inc., a security company that specializes in helping corporations prepare for this sort of attack, defines the technique as "any act that influences a person to take an action that may or may not be in their best interest."
Say, just for example, a stranger calls up your cell provider — pretending to be you — and convinces the call center worker to reset your SIM card. That's not in the employee's interest, nor yours. And, as Black Lives Matter activist DeRay Mckesson found out in 2016, the consequences can be rough.
This Tweet is currently unavailable. It might be loading or has been removed.
This Tweet is currently unavailable. It might be loading or has been removed.
This wasn't the first time someone talked their way past a public figure's digital security. In 2012, a hacker tricked Apple into giving up access to tech reporter Mat Honan's iCloud account. Through that, the attacker was able to get into both Honan's Gmail and Twitter accounts — remotely wiping his iPhone, iPad, and MacBook Air for good measure.
"I know how it was done now," Honan explained on his blog at the time. "Confirmed with both the hacker and Apple. It wasn't password related. They got in via Apple tech support and some clever social engineering that let them bypass security questions."
Basically, all the maliciously inclined need to socially engineer their way in is the right talking points and a little luck. AND for those in need of some help, there are even web forums dedicated to sharing tricks of the trade.
It's almost too easy, and no five-word passphrase can do anything to prevent it.
That being the case, shouldn't the companies that protect our data be on the lookout for this sort of thing? Thankfully, many now are. However, they are essentially forever fighting a losing battle. Social engineering relies on exploiting human nature, and last time we checked human nature is something that doesn't change all that easily.
So what can you do? Well, besides making sure you don't give out any information that could later be used to impersonate you, a simple bit of protection is to enable two-factor authentication on everything and use authenticator apps wherever possible. Also, definitely go ahead and get a PIN/customer care password for your cellphone account.
Oh, and be paranoid. Very, very paranoid.
Topics Cybersecurity
'Awesomenauts' reimagines the MOBA in the best way'Ocean's 8' lack of conflict is the most important part of its fantasyWarner Bros. is cracking down on unofficial Harry Potter festivalsTesla drama: Elon Musk calls out sabotage by disgruntled employeeNeighbors fight dirty on Nextdoor about Bird, Lime eGrimes is here to actually make you feel good about owning a MacBillie Lourd rocked her mom's iconic Star Wars buns at a baseball gameChris Pratt’s 9Leslie Jones has some candid advice for dealing with internet trollsMashTalk: The gig economy crash, with 'Gigged' author Sarah KesslerLeslie Jones has some candid advice for dealing with internet trollsApple Maps is downSouth Korea and Sweden World Cup match preceded by subterfugeApple to add lifeBeyoncé and Jay Z just dropped a surprise album OMFGHere's how to finally trade Pokémon and add friends on Pokémon GoMozilla's 'Scout app' might be a voiceMozilla's 'Scout app' might be a voiceBeyoncé and Jay Z just dropped a surprise album OMFGRefugee numbers at a 'record high' — here's how to fix that NVIDIA's new Shield TV ups the Android streaming game Donald Trump should really learn who April Ryan is Can Facebook's News tab fix the problems News Feed created? Coven of aquatic witches take to the water for annual paddleboarding Facebook sues alleged WhatsApp spyware developer Emilia Clarke's 'Game of Thrones' love triangle Instagram post wins 'Watchmen': Everything you need to know from the comic after Episode 2 The unfortunate tenacity of the most common piece of litter New 'Tiny Trumps' meme has flooded the internet big time Trendsetters teach us how to pose for show Everything coming to HBO Now in November 2019 Apple responds to people's tweets with entire commercials There's a reason why you feel like time is moving slower in Trump's America Childhood smartphone usage rates continue to rise Activists explain how 'climate justice is racial justice' Apple lawyer tasked with preventing insider trading indicted for *checks notes* insider trading Bill Maher doesn't understand how Milo Yiannopoulos works Justin Trudeau and Angela Merkel had a candlelit dinner and I am fine with that The rise of edible plastics, from whiskey pods to potato forks The infamous 11 foot 8 Bridge is being raised and the internet is sad about it
2.3293s , 10139.296875 kb
Copyright © 2025 Powered by 【Dear Utol (2025): TBrgy. Chairman Episode 39】,Co-creation Information Network