Sex AppealScammers will lure unsuspecting victims by masquerading as an attractive man or woman on a social network.
Successful cyber crime often depends on the kindness of others - those good souls who believe that the Facebook message , LinkedIn request or Tweet they received is from someone they actually know and therefore trust. As a CIO, it's imperative that you know your employees' weak spots, particularly when it comes to cyber crime perpetrated via social networking platforms. In its 2010 Annual Security Report, Cisco reveals the seven deadly human weaknesses that make your employees vulnerable to malicious attack. Chances are, your technology users are inherently good people, so their suspicions aren't likely to be aroused when cyber criminals strike through social media venues populated with friends and acquaintances. This is especially the case when messages involve someone asking for help. "Compassion and urgency are common social engineering hooks for criminals," says Christopher Burgess, senior security advisor to Cisco. "The individual seeking information will attempt to trigger the target's basic human need to be helpful. The individual will also infuse a sense of urgency in their quest for information or specific action, with the expectation that you won't have sufficient time to verify their credentials." Here we take a look at the seven human traits cyber criminals most frequently seek to exploit, and what you can do about them.
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.