Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Computer security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Social engineering=== [[Social engineering (security)|Social engineering]], in the context of computer security, aims to convince a user to disclose secrets such as passwords, card numbers, etc. or grant physical access by, for example, impersonating a senior executive, bank, a contractor, or a customer.<ref>{{cite web |last=Arcos Sergio |title=Social Engineering |url=http://upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf |url-status=live |archive-url=https://web.archive.org/web/20131203043630/http://upcommons.upc.edu/pfc/bitstream/2099.1/12289/1/73827.pdf |archive-date=3 December 2013 |access-date=2019-04-16 |website=upc.edu}}</ref> This generally involves exploiting people's trust, and relying on their [[cognitive bias]]es. A common scam involves emails sent to accounting and finance department personnel, impersonating their CEO and urgently requesting some action. One of the main techniques of social engineering are [[phishing]] attacks. In early 2016, the [[FBI]] reported that such [[business email compromise]] (BEC) scams had cost US businesses more than $2 billion in about two years.<ref>{{cite news |last1=Scannell |first1=Kara |title=CEO email scam costs companies $2bn |url=http://www.ft.com/intl/cms/s/0/83b4e9be-db16-11e5-a72f-1e7744c66818.html#axzz41pN5YBV4 |access-date=7 May 2016 |work=Financial Times |issue=25 February 2016 |date=24 February 2016 |archive-url=https://web.archive.org/web/20160623105523/http://www.ft.com/intl/cms/s/0/83b4e9be-db16-11e5-a72f-1e7744c66818.html#axzz41pN5YBV4 |archive-date=23 June 2016}}</ref> In May 2016, the [[Milwaukee Bucks]] [[NBA]] team was the victim of this type of cyber scam with a perpetrator impersonating the team's president [[Peter Feigin]], resulting in the handover of all the team's employees' 2015 [[Form W-2|W-2]] tax forms.<ref>{{cite news|title=Bucks leak tax info of players, employees as result of email scam|url=https://www.espn.com/nba/story/_/id/15615363/milwaukee-bucks-leak-tax-information-players-employees-result-email-scam|access-date=20 May 2016|agency=Associated Press|date=20 May 2016|url-status=live <!-- technically unfit but effectively dead-->|archive-url=https://web.archive.org/web/20160520144908/http://espn.go.com/nba/story/_/id/15615363/milwaukee-bucks-leak-tax-informatiopn-players-employees-result-email-scam|archive-date=20 May 2016}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)