Preview

Case Of Farmers And Merchants Bank

Good Essays
Open Document
Open Document
844 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Of Farmers And Merchants Bank
My first real life case where social engineering techniques were used is in the case of Farmers and Merchants Bank had customers who received text messages from numbers stating that the customer should call an 800 number. The people who were contacted via text message were told that either the needed to speak with the security department or that they had been selected to receive the Achieve Card from Farmers and Merchants Bank. This was a form of text phishing that the fraudulent people used. My second real life case where social engineering techniques were is was on Google accounts. This case is where the thief’s tried to steal Google accounts by using phishing emails. The email stated that the victims account would be locked in 24 hours …show more content…
The email invited the users to do an instant increase to avoid their account being shut down. The offender were able to avoid detection by people because they used what is called a data URI scheme. This makes their link look real. This scheme was caught by a program called Bitdefender. My third real life case of social engineering techniques involved ICloud. During this case people who owned Apple devices received emails or text messages from someone pretending to be Apple. They are them requesting the user’s login information which allows them to hack in and steal personal information such as pictures. These hackers are using the locked out or someone who was not authorized to access your account method to gain this information. My fourth real case of social engineering techniques is in relation to GoDaddy and @N Twitter account. GoDaddy admitted that the reason the @N Twitter account was hacked is because one of its employees had been social engineered to give out personal information which allowed these hackers to hack into Naoki Hiroshima's account. The hackers contacted not only GoDaddy but also PayPal. PayPal denied giving out …show more content…
As for credit or bank card theft this is when a person steals another person’s card information to gain access to the originalowner’s personal information and could also use the card for personal purchases. Skimming is when a person goes to a gas pump unaware that a device has been placed in the card reader and they swipe their card and its information is then transmitted to a computer. Pretexting is when a thief has done their homework on the victim and uses this information to gain further information from the victim. Man-in-the-middle is when a hacker gathers information from recording two people without their knowledge to gain intel to take their personal information to use. Phishing schemes is when the thief gains your personal information by tricking you into willingly giving it to them. Pharming is hacker changes a website to reroute you to a fake site to gain your information. Vishing is when a thief uses voice communication to gain the victims personal information. Search engine schemes are where a thief uses a too good to be true approach via websites and search engines contain said websites then you visit the website and they gather your personal information. SMiShing is

You May Also Find These Documents Helpful