Impersonators gathering information

Usually, impersonators gather information by social engineering and then patiently wait to put pieces of information together and then stitch them. Thus, even a small piece of information serves as a connecting part of the puzzle.

Common social engineering methods include the following:

  • Stalking
  • Crawling compromised sites
  • Sending phishing emails
  • Dumpster diving
  • Eavesdropping
  • Tailgating
  • Shoulder surfing
  • The use of USB devices loaded with malware and many more
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset