Consumers are using mobile apps to access the Internet on an average of 4.5 hours per day. Instant access and always-on technology opens the risk for malicious activity when using mobile devices. Lisa Bock reviews methods to get consumers to click on a link and download malware along with best practices to avoid mobile-based attacks.
- [Voiceover] Over the last 10 years,…we've seen a continued massive growth of cyber crime.…One reason for the expanded growth is because…of advances in mobile technology.…We can see here in this graph as it represents…in 2010, one billion desktop users accessing the internet.…Fast forward to 2020, we see a projection…of 10 billion mobile users accessing the internet.…Mobile internet is used on a number of different devices.…
We see them on smart phones, iPads, car electronics,…Kindles, gaming, and even home appliances.…Social engineers know that consumers are using mobile apps…to access the internet on an average of 4 1/2 hours a day.…Instant access and always on technology opens the risk…for malicious activity.…As a result, there are many ploys to get consumers…to click on a link and download malware.…
Those ploys might include,…sending a user a message to click on a link…that has a funny video,…dial a number to receive a voice message,…send a link to a phony patch.…The website might look legitimate,…however, it's most likely a cloned version…
In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"—how hackers use charm, power, and influence to penetrate an organization—and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks.
Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Visualizing the victim
- Recognizing an attack
- Using charm, power, and influence
- Manipulating with social media
- Preventing insider attacks
- Stealing identities
- Pen testing with social engineering
- Taking countermeasures