• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Cyber Security Solutions, Compliance, and Consulting Services - IT Security

We offer It security management, data, network, & Information security services for protecting information & mitigating security risks to your organization.

  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

05 common social engineering tactics

By kamran | At September 10, 2019

Sep 10 2019

05 common social engineering tactics

Tricking someone into doing something has been around for ages, but the word social engineering was brought forward in the 90s. The cybercriminals these days aim to steal a password install malware by using old and new tactics. 

 

Here are some of the most common social engineering tactics used by phone, email, and Web.

 

Ten degrees of separation

 

The goal of a social engineer over the telephone is to convince his target that he is a fellow employee or a trusted outside authority as law enforcement or an auditor. The attacker will email or call a different person to gather information about their target. 

 

The employee should be paranoid because you never know what a person wants from you. Every employee in the firm from the person at the gate and one at the reception should be trained about social engineering. The attackers might be ten moves away from the person they want to get.

 

Learning your corporate language

 

The cybercriminal discovers the corporate language of a firm before communicating with anyone. The social engineers use the corporate language to gather information as the employee’s trust and share information when one is using the language you understand and are familiar with. 

 

Borrowing your ‘hold’ music

 

One of the common tactics social engineers use is using the hold music which a company uses when the callers are left on waiting. The hacker records the music and uses it to gain the trust of the victim. After talking to the victim, the hackers says “oh” there is another call, so you have to hold for a while. The victim, after hearing the hold music, trusts him and shares sensitive data. 

 

Phone-number spoofing 

 

One of the common social engineering tactics is using phone-number spoofing. The cyber-criminal will be sitting in his apartment while calling you, and the number which appears on your phone will show up to be from the company. In this case, the employees get fooled and share sensitive data with them. 

 

Abusing faith in social networking sites

 

Social engineers also use social media websites like Facebook, LinkedIn, and other popular sites to target the victim. The victim receives an email which suggests clicking on the link to update their information as the social media is doing maintenance. With clicking on the site, your information goes to the wrong hands. Employees should type the web address manually to avoid such malicious links. 

Written by kamran · Categorized: Cyber security threats

Primary Sidebar

Recents post

Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted

Ransomware groups continue to … [Read More...] about Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted

New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks

With confidential client … [Read More...] about New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks

Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

From ransomware attacks … [Read More...] about Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

Categories

  • AI and cybersecurity (2)
  • blockchain (1)
  • Cloud security (29)
  • Compliance (25)
  • Cyber security news (108)
  • Cyber security threats (376)
  • Cyber security tips (370)
  • Data Security (3)
  • E-Commerce cyber security (3)
  • Education cyber security (1)
  • Enterprise cyber security (7)
  • Financial organizations cyber security (4)
  • General (22)
  • Government cyber security (4)
  • Healthcare cyber security (19)
  • Information Security (2)
  • Law Firms Cyber Security (9)
  • Network security (9)
  • Newsletter (1)
  • Privacy (1)
  • Ransomware (14)
  • remote work (1)
  • Risk assessment and management (6)
  • Security management and governance (9)
  • SME Cybersecurity (2)
  • Software Security (2)
  • Supply Chain Attacks (5)
  • System security (3)
  • Uncategorized (29)
  • Vendor security (14)

Archives

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Healthcare Cybersecurity Roundup: Hospitals, Labs, and RCM Firms Targeted
  • New Cyber Threats for Law Firms: ICC Attack, Firm Breaches, and AI-Driven Risks
  • Healthcare Under Siege: 3 Major Data Breaches + the Rise of Bert Ransomware

Get Social

  • LinkedIn
  • Home
  • About Us
  • Solutions & Services
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Privacy Policy Terms of Use Acceptable Use

Copyright © 2025 | All right reserved