Watch videos with subtitles in your language, upload your videos, create your own subtitles! Click here to learn more on "how to Dotsub"


0 (0 Likes / 0 Dislikes)
  • Embed Video

  • Embed normal player Copy to Clipboard
  • Embed a smaller player Copy to Clipboard
  • Advanced Embedding Options
  • Embed Video With Transcription

  • Embed with transcription beside video Copy to Clipboard
  • Embed with transcription below video Copy to Clipboard
  • Embed transcript

  • Embed transcript in:
    Copy to Clipboard
  • Invite a user to Dotsub
Social engineering is one of the most common types of attacks because it is simple, effective, and technology alone cannot stop it. Social engineering is the art of human manipulation, where attackers trick you into doing something you should not do. These attacks are so effective because they often play on human emotions. A social engineering attack can take many forms, including phone calls, text messages, emails, social media, and even person-to-person interaction. Be alert when at work or at home, as these attacks can come from anywhere, at any time. Let’s look at an example of a real social engineering attack. You receive an urgent text message from your bank. The message informs you that your account has expired and will be locked. It then gives you a special phone number to call to update your account. When you call the phone number, it’s an automated system that first asks you a series of personal questions to prove who you are. However, this is not really your bank, nor is the system trying to determine your identity. Instead, this is an automated attack by cyber criminals who are attempting to record and steal all your information, including your birth date, credit card or bank numbers, home address, and phone number. Their goal is to steal your identity and financial information. Let’s look at an advanced social engineering attack. You receive an email that appears to be from your boss. The email is short and urgent. It says that law enforcement is conducting an investigation of our organization and that people may have to go to jail. The email then states that you will receive a phone call in 15 minutes from our legal team, and that you are to answer any questions they ask. However, the email was not from your boss. It’s a fake. The person that calls you 15 minutes later is not really from our legal team, but the same cyber attacker, now pretending to be a lawyer. They are using multiple steps to make the attack seem more like a legitimate request, in order to get you to give up as much sensitive information as possible. How can you protect yourself from social engineering attacks? Spot them before they happen. Here are some of the most common clues to help identify an attack: Someone creating a tremendous sense of urgency, often through fear, intimidation, a crisis, or an important deadline. They are trying to rush you into making a mistake. Any requests that pressure you to bypass or ignore our security procedures or policies. Anyone asking you for information they should not have access to. A message from a friend or co-worker you know, but the signature, tone of voice, or wording in the message does not sound like them. An offer playing on your sense of curiosity or promoting a gift or prize. If something sounds too good to be true, it probably is. You play a key role in detecting and stopping social engineering attacks; do not rely on technology alone to do it for you. If you feel you are being targeted by a social engineering attack, simply hang up the phone or ignore the message, and report the incident immediately.

Video Details

Duration: 3 minutes and 49 seconds
Country: Andorra
Language: English
License: Dotsub - Standard License
Genre: None
Views: 9
Posted by: pphelan on Nov 27, 2019


Caption and Translate

    Sign In/Register for Dotsub to translate this video.