So cybercriminals work to get your information
Evildoers disguised as cleaners and waiters accessing false dispatches to steal information from computers, USB sticks infected with abandoned places and pass to an unsuspecting employee meta on your PC, are tricks of the cybercriminal to gain confidential data.
Many of these scams are based on “social engineering”, from very basic methods of persuasion; lures such as USB sticks and CD infected and abandoned places of passage, such as garages, or other are used to lure victims and subconsciously persuade them to implement collaborative actions unknowingly with the plans of the wrongdoer.
Some of the tricks of the cybercriminal are well known, such as e-mails from Nigerian businessmen alleged that offer high-paying jobs, but unfortunately often linked to illegal activities.
Others, however, are less popular, but are gaining popularity among the ranks of evildoers.
For example, the intrusion of fake employees in offices, wearing uniforms or cleaning disguised as technical failures, or other servers to go unnoticed and have free access via executive office those who steal confidential data without suspicion.
“Such practices are being performed more often than we think,” insisted the expert, who added that the cybercriminal is learning to select very carefully to those victims who can get more money.
Social networking is another great tool to thoroughly follow the digital trail of their prey in order to address them at the appropriate times.
According to the expert, you are checking that cybercriminals real work done prior research before attacking, from the messages left by potential prey in spaces like Facebook or Twitter.
Just dive into the network, they can tell if a person is a senior manager of a company, when you travel and where, when he will return, etc..
Cybercriminals very fine point: a manager can be easily infected after opening an email in which he warns of very specific things, like you have forgotten to sign the authorization of your child for a tour.