Cybercriminals use browsers, to provide the bait, and lure someone into revealing confidential information or downloading malware. Lisa Bock dives into methods to protect yourself, including avoiding risky websites, browser choice, browser updates, and proper use of plugins and extensions, along with anti-exploit protection.
- View Offline
- [Voiceover] Social engineering uses various…non-technical methods to trick people,…however cyber criminals commonly use browsers,…the technology that is the portal to the World Wide Web,…to provide the bait…and lure someone into revealing confidential information…or download malware.…Even though users are aware…of the ongoing security risk in browsers,…many still don't take steps to avoid the dangers.…The best defense is to stay away from risky websites,…especially when Endpoint Protection warns you…that the website has a bad reputation.…
There are several ways to lock down your browser…to protect against attacks.…Browser choice, browser updates,…plugins and extensions,…and Anti-Exploit protection.…Your choice in browsers will also influence…a possible attack.…Chrome is regarded as a safe browser,…followed by Firefox.…Microsoft's Internet Explorer…is more susceptible to malware,…but modern Windows operating systems…have replaced Internet Explorer with Edge.…
Whatever browser you use,…you should use good security habits.…
In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"—how hackers use charm, power, and influence to penetrate an organization—and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks.
Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Visualizing the victim
- Recognizing an attack
- Using charm, power, and influence
- Manipulating with social media
- Preventing insider attacks
- Stealing identities
- Pen testing with social engineering
- Taking countermeasures