Skip to main content

Posts

Social Engineering Tactics on a Global Scale

It is to our benefit to fathom the tentacles of social engineering tactics introduce by cyber attacker on a daily basis. Far and wide Investigations by Interpol, FBI, and the Toronto police revealed how deceptive participants are networking and exchanging information on how to be better at what they do (check out the video far below). 
Several years ago, when I was oblivious to basic terminologies related to cyber security, I knew very little about social engineering orchestrated by cyber attackers. I thought it was a practice initiated by computer experts to combat viruses. Since I was no expert on such systems, I spent years with no interest in educating myself on technological systems. 
It took me a long time to understand; but learning the basics of closing the door on cyber criminals in restricting access to systems or information does not require a profound knowledge of computers. 
Social Engineering is actually a tactic to trick people into doing something they should not do, such…
Recent posts

Holiday Scams

Every year while we fulfill our appetites with turkey and ham during the Thanksgiving holiday, cyber attackers stuff their naughty heads with ways to steal away our financial information or identity.

Holiday scams are highly prevalent from Black Friday throughout Christmas.

Our needs and desires during the winter solstice is at its peak while we are rushing to get things done. Balancing our priorities tend to knock us off focus and this deficiency makes us vulnerable to hackers.

Robocalls is only part of their Modus Operandi. Their unseen tentacles can strike from any direction. The best way to maximize our defenses is to understand and expect the type of online scams they will orchestrate.

Lets examine some of these crocked methods and the best practice we can apply in being proactive against cyber predators.

Phoney Websites Unsolicited emails of a good deal is a tool by cyber attackers to trick victims into downloading malware. Their objective is to steal your identity and take you…

Social Engineering is a Trick

What in the World is Social Engineering? In the way a magician uses timing and diversion to fool an audience, a cyber attacker can apply social engineering tactics to trick you into sharing sensitive data. Within the cyber security world, it is regarded as the art of human manipulation.

The objectives of these criminals are to fool you in doing the following-


opening an infected email attachmentsharing passwordsallowing a stranger into a physically secure areasending sensitive information Technology alone can't stop these computer criminals from using various methods such as phone calls, text messages, emails, social media access, and physical presence from getting their hands on information they should not have access to. 
Examples of Techniques
Suppose you get an important message from your bank. You are informed your bank account had expired and your account will be locked. You get a unique phone number to call in and update your account. 
You make contact and have to endure an …

Internal Tools for Cyber Security Defenses

OUR BUILD-IN MECHANISM
We must equip ourselves with the internal tools we already have in enhancing our defense. Cyber Attackers know the importance of utilizing social media to increase their chances of deceiving the unsuspecting. 
Like a contractor hired by a business to study the market for potential buyers, computer criminals spends a great deal of time phishing for those who are gullible. 
What we say or post about ourselves on social media is like them stumbling upon a treasure chest. 
Don't assume for a second this apply to just the elderly. It can happen to any group, especially college  students. Their targets varies just as much as their methods. 
For example, just over 2-years ago in Chicopee, police uncovered 30 fictitious instagram, twitter, and facebook accounts by someone or some group posing to be local lottery winner Mavis Wanczyk. It's right here https://www.masslive.com/news/2017/08/chicopee_police_30_fake_scam_a.html
At this time, Wanczyk was the winner of …

"Cyber Attackers Impact" by Ken Harris

Can the average person fathom the magnitude of daily tactics by a cyber attacker? Do you know? Are you prepared in event a scammer tricks you into giving up personal or private information they should not have access to?

After some encouragement from friends, along with my natural desire to help others, each week, I will be sharing what I know about cyber security fraud from my experience in law enforcement, ongoing trainings, latest news happenings around the world, and interviews with experts and readers with a desire to share their feedback or suggestions.

With all that's been happening in the world, I hope this platform will be a source to help you safeguard sensitive data.

It's important to know that these cyber criminals are plotting on a regular basis to deceive unsuspecting victims in a variety ways. They typically rush you into making regrettable errors such as-


Opening an infected email attachmentSharing passwordsProviding them restricted information they SHOULD NOT h…