The email invited the users to do an instant increase to avoid their account being shut down. The offender were able to avoid detection by people because they used what is called a data URI scheme. This makes their link look real. This scheme was caught by a program called Bitdefender. My third real life case of social engineering techniques involved ICloud. During this case people who owned Apple devices received emails or text messages from someone pretending to be Apple. They are them requesting the user’s login information which allows them to hack in and steal personal information such as pictures. These hackers are using the locked out or someone who was not authorized to access your account method to gain this information. My fourth real case of social engineering techniques is in relation to GoDaddy and @N Twitter account. GoDaddy admitted that the reason the @N Twitter account was hacked is because one of its employees had been social engineered to give out personal information which allowed these hackers to hack into Naoki Hiroshima's account. The hackers contacted not only GoDaddy but also PayPal. PayPal denied giving out …show more content…
As for credit or bank card theft this is when a person steals another person’s card information to gain access to the originalowner’s personal information and could also use the card for personal purchases. Skimming is when a person goes to a gas pump unaware that a device has been placed in the card reader and they swipe their card and its information is then transmitted to a computer. Pretexting is when a thief has done their homework on the victim and uses this information to gain further information from the victim. Man-in-the-middle is when a hacker gathers information from recording two people without their knowledge to gain intel to take their personal information to use. Phishing schemes is when the thief gains your personal information by tricking you into willingly giving it to them. Pharming is hacker changes a website to reroute you to a fake site to gain your information. Vishing is when a thief uses voice communication to gain the victims personal information. Search engine schemes are where a thief uses a too good to be true approach via websites and search engines contain said websites then you visit the website and they gather your personal information. SMiShing is