Director of BlackBerry Security: Here's How to Fend Hacker Attack

Director of BlackBerry Security: Here's How to Fend Hacker Attack

Most of us who spend a lot of time thinking about how to create strong passwords and encryption to prevent hacker attacks. In fact, the mechanism of social engineering has become a key element in the weapon hackers.

Social engineering is about how to manipulate others to defeat security. Social engineering can be a hacker posing as a trusted worker asks about personal information, or more generally a phishing email in which hackers ask for personal information by pretending to be a trustworthy organization.

To protect themselves from attacks by hackers, here are some surefire tips from Alex Manea as Director of BlackBerry Security.

Belief But Verify Preemptively
Social relationships are built on trust, we believe in the family, believe in a friend, and trust in companies that do business relationship with us. But on the Internet, the traditional authentication method is often easier to forge.

"A few years ago, I was invited to speak at a major conference security industry. A few weeks later, I get an email from the Gmail address is not known with attachments asking me to fill out personal information to reserve a hotel room," said Alex through its official statement, Tuesday (12/22/2015).

Having seen a few times, he continued, forward the email to a contact in the conference, which confirmed that the request was legitimate.

"I can not resist the urge to show irony in asking for sensitive information from the source are not authenticated to a security conference," he concluded.

However, Alex chose to verify because it is an unexpected email from an unknown address or not reliable, they are also asking for personal information that is specific, and the time required to verify them fast enough compared to the risks that should be experienced by not doing so.

Read Web Links From Rear
The goal of phishing is to obtain personal information such as passwords and credit card numbers. This is usually done by linking to a website that is designed by hackers to perform like a website that you know and trust (eg Google).

Sometimes, because of frequent copying of text and pictures from the original website is trivial, the only indication that you realize that you are on the fake website is the web address or commonly called a URL.

The web address is read from right to left, so if you are on https://www.google.com, you can be pretty sure that it is valid. To set up a Google account, you can visit https://myaccount.google.com. Here, Google is a second level domain and "my account" is a subdomain owned and run by Google.

Perpetrators of phishing use the advantage of the fact that most of us read from left to right, so be very careful with URLs like https://www.google.youcantotallytrustme.com.

Taking One Step Into Rear
The perpetrators of phishing fraudsters and wish to act first and think later. That is why most social engineering tactics involve an urgent request. Before you click a link or provide personal information, take a step back and think.

Ask yourself why a reputable company sends a message like that and why the message is coming through email or text message.

When you already know what needs to be recognized, phishing scams are often quite simple. If you remain calm and trust but verify, you can protect yourself from most scams.

And even if you love to be able to earn extra money to help the prince of Nigeria, won the lottery in the Netherlands, or just working from home, we are also smart enough to realize that if it is too good to be true.

Post A Comment
  • Blogger Comment using Blogger
  • Facebook Comment using Facebook
  • Disqus Comment using Disqus

No comments :


Smartphones

[Smartphones][threecolumns]

Computers

[Computers][bleft]

Gadgets

[Gadgets][twocolumns]

Technology

[Technology][twocolumns]

Games

[Games][twocolumns]

Review

[Review][twocolumns]

Tips Tricks

[TipsTricks][twocolumns]