An Overview of Social Engineering

Social engineering preys on the fact that humans are the weakest link in information security. This article explains the social engineering model, outlines the two categories of social engineering attacks, and discusses techniques for preventing and mitigating social engineering.

3. Social Engineering Attacks

3.7. Fake Software Attacks

Fake software attacks, also called fake websites, are based on fake websites to make victims believe they are known and trusted software or websites. The victim enters real login information into the fake website, which gives the attacker the victim’s credentials to use on the legitimate website, such as access to online bank accounts. An example of these threats is the tabnabbing attack which consists of a fake web page that looks like the login page of a popular website usually visited by the victim, such as online banking, Facebook, or Twitter for example. The victims enter the login details when focusing on something else. The malicious user exploits the trust the victims have for these websites and gets access to their credential information.