MENU

CYBERCRIME KNOWLEDGE (PART 2)

CYBERCRIME KNOWLEDGE (PART 2)

In this chapter, we will focus on the most common form of cybercrime; Social engineering.

What is Social engineering?

This is a type of attack that relies on interactions between humans instead of computers. Because humans are the weakest link in any security system, a cyber-criminal can get a victim to reveal personal information over the internet.

Scenario 2

Sade has been talking to this fresh guy she met on Facebook. They got very close and in no time, emotions set in. This made Sade tell the guy everything about herself. A few days later Sade runs into her friend, Bola. After catching up, Bola asked about her mum’s health and the operation she had. Sade was confused because her mum never had surgery. Bola reminded her about the Instagram message she got from her, telling her to urgently send money to her cousin’s account and not to bother calling her number as it is currently unreachable.

Sade was shocked and she asked her friend to send the supposed account detail. To her surprise, the account detail carries her fresh Facebook lover’s name.

The first question is, how was he able to log into her account?

Let us analyze it:

She gave too much information to her Facebook lover. Please note that I do not have an issue with having an online lover, but the amount of information you share is crucial. Every little information can be used efficiently to compromise you.

Guess Sade’s password?  Deji@1992. DEJI is her first boyfriend’s name and 1992 is her birth year. Most used special characters are @ and exclamation mark (!) and maybe full-stop (.) Cybercriminals don’t need sophisticated equipment to guess some passwords, they can easily extract it from an individual.

When Sade’s friend got a message and the odd request to send money to another account, she should have taken time to confirm the source of the message. Such cyber-criminal can send spam messages to a lot of people on the contact and at least 1 of them will fall for it.

When to Act

If you notice (or get notified about) changes to your account that you didn’t make, it’s time to do something.

What kind of changes?

  1. Your personal information gets updated: Birthday, email, password, etc.
  2. If you notice an influx of new friends that you didn’t send requests to, something is wrong.
  3. People are getting messages you didn’t send: If someone tells you they got a message from you and you know you didn’t send such a message.
  4. You see unknown published posts on your account
  5. If someone you know sends an email to you but the message seems odd, their account may have been hacked. Don’t reply to the message or click any links unless you can confirm the email is legitimate.

How to avoid social engineering

  1. That cute guy you chat with on Facebook, stop giving him unnecessary information. Stop it in Jesus Name!
  2. That old friend that suddenly starts asking questions, stop giving him unnecessary information.
  3. Avoid being too emotional about your safety
  4. When you notice unusual or suspicious actions in your account, change your password immediately
  5. Enable two-factor authentication
  6. Create a strong and secure password
  7. Use unique passwords for every account
  8. If asked to create answers for security questions, consider using fake answers to make them even more difficult to guess.

PASSWORD: My best Password practices

  1. Strong passwords are good, but only when combined with other measures such as a two-factor authentication
  2. Creating password: use Caps + special characters + number
  3. The longer the better
  4. We usually recommend a change of passwords at least every 3 months
  5. Make your passwords hard to guess but easy for you to remember
  6. Never reveal your passwords to others.
  7. If strong passwords are too complicated to remember or users are forced to change them too frequently, people won’t be able to memorize them and will start making notes in one form or the other, thereby undermining even the most sophisticated security tools.
  8. Avoid saving or writing down your passwords

To be continued

DESEYE

Share this post

Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on whatsapp
WhatsApp
Share on email
Email

Leave a Reply

Your email address will not be published.