Lucas Carpio
Jumil Ortiz
Refers to psychological manipulation of people for the purpose of information gathering, fraud or system access.
Involves some prior research or setup and the use of this information for impersonation to establish legitimacy in the mind of the target.
The objective of this technique is to persuade the person responsible for a legitimate delivery that the consignment is requested elsewhere.
Is a technique of fradulently obtaining private information.
Uses a rogue IVR(Interactive Voice Response) system to recreate a legitimate-sounding copy of a bank or other institution's IVR system.
The attacker leaves a malware infected USB in a location sure to be found, gives it a legitimate looking and curiosity-piquing label, and simply waits for the victim to use the device.
An attacker calls random numbers at a company, claiming to be calling from technical support. Eventually this person will hit someone with a legitimate problem, grateful that someone is calling back to help them.
Seeking entry to a restricted area secured by unattended, electronic access control.
Organizations reduce their security risks by:
Establishing frameworks of trust
Identifying which information is sensitive
Establishing security protocols, policies, and procedures for handling sensitive information.
Training employees
Performing unannounced, periodic tests of the security framework.
Using a secure waste management service