ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Halloween, Hackers are Pretending to Be You

This Halloween, Hackers are Pretending to Be You

Halloween is a great time for people of all ages to let loose and embrace their spookier, darker side--even though they aren’t. For hackers, however, every day is like Halloween, but with ill intentions. Hackers will pretend to be someone they’re not in order to scam you out of sensitive data or personal information. By identifying their tricks, you can keep hackers from getting their treats.

The aforementioned tricks are typically characterized as social engineering tactics, where a hacker will trick users into thinking that they’re a trusted organization, or even someone within their own business. Unlike those who participate in Halloween dressed in silly costumes, it’s not so easy to distinguish a social engineering attack from normal everyday occurrences. This is what makes the trick so convincing. Therefore, it’s imperative that you know what to look for, and how to address it properly. Also, in the same way you check your kid’s trick-or-treat candy for anything that might be harmful, you need to view unsolicited digital communications with a degree of healthy skepticism.

The unfortunate fact is that social engineering attacks (including phishing scams) work, which is why they’re commonly used by hackers. Even the most vigilant user can fall victim to a social engineering scam, which prompts people to wonder what makes a social engineering attack so effective. Researchers from the University of Erlangen-Nuremberg in Germany decided to pursue this thought and performed research into what makes people want to click on suspicious links.

Zinaida Benenson presented the university’s findings at the most recent Black Hat convention in Las Vegas. It was discovered that the success of social engineering attacks was largely due to the hacker understanding the circumstances of the scam and personalizing the link to appeal to the victim at that specific time: “By a careful design and timing of the message, it should be possible to make virtually any person to click on a link, as any person will be curious about something, or interested in some topic, or find themselves in a life situation that fits the message content and context."

In other words, proactive training and education aren’t enough. Even the best employee could click on a link that aligns with their personal interests. ZDNet uses the example of an employee who has recently attended an event and is then sent a link to an online photo album containing memories of the event. The user will want to click on the link to see what the photos are, regardless of who it’s from. Once he has done so, the hacker succeeds; he has appealed to the natural curiosity of the user, and thanks to the timing of the message, the user is almost guaranteed to click it.

Another common example is an employee who is experiencing persistent technical trouble with their workstation. They might receive an email from “tech support” claiming that the problem can be resolved by downloading remote access software. The frustrated employee will click on the link because it fits their current needs and situation and because users typically trust tech support.

Just like how it takes energy to build an impressive Halloween persona, these hackers require immense time and preparation in order to successfully pull off a social engineering scam. These types of personalized attacks make social engineering scams challenging to protect yourself against. Yet, not all hope is lost. Educating your employees on security best practices and implementing spam blocking solutions designed to eliminate spammy emails may be the best way to avoid a fright.

Have a safe and happy Halloween, from all of us at ClearView IT.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media Users VoIP Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Covid-19 Disaster Recovery IT Support Browser Windows 10 Managed Service Apps Miscellaneous Cloud Computing Outsourced IT Remote Work Managed Service Provider Data Management Internet of Things Saving Money Operating System Government Windows Workplace Strategy Gadgets Artificial Intelligence Managed IT services Networking App WiFi Virtualization Information Spam Remote Mobile Device Management Business Technology Bandwidth Encryption Blockchain Server Gmail Office Budget Two-factor Authentication Office 365 Employee/Employer Relationship Apple History Information Technology Data Security Big Data Conferencing Wi-Fi BDR Cybercrime Health Access Control Analytics Save Money Remote Computing Help Desk Patch Management Hacking Remote Monitoring Vendor Hacker Cost Management IT Management Training Voice over Internet Protocol Employer-Employee Relationship Compliance Document Management Outlook Password Project Management BYOD Computing Applications Vendor Management Hard Drive Money Vulnerabilities Search... Customer Service Unified Threat Management Best Practice Firewall Mobile Office Legal Retail Augmented Reality Word Alert Managed Services Data storage IBM Data loss Hiring/Firing Website Travel Virtual Reality Social Engineering The Internet of Things Cryptocurrency Paperless Office Antivirus YouTube Black Market Chrome Maintenance Cleaning Robot Laptop Data Breach Mobile Computing Websites Mobility Marketing Meetings Windows 11 Running Cable Social Sports Monitoring Google Maps DDoS Twitter SaaS Scam Healthcare Storage Remote Workers Law Enforcement End of Support iPhone Printer Cortana Windows 7 VPN Education Free Resource Content Filtering Update How To User Router Bluetooth Taxes Distributed Denial of Service Images 101 Office Tips Integration Private Cloud Memory Display Virtual Assistant Physical Security Employees Wireless Technology Avoiding Downtime Politics Machine Learning Settings PowerPoint eWaste Holidays Administration Processor Start Menu Solid State Drive Downloads Downtime Presentation Computer Care Cooperation Specifications Safety IT Consultant Video Conferencing Vulnerability Virtual Machines Chromebook Software as a Service Virtual Desktop Drones Data Protection Experience Customer Relationship Management Computer Repair Automobile Co-Managed IT Multi-factor Authentication Professional Services Entertainment How To Saving Time Microchip Flexibility Disaster Managed Services Provider Computers Bitcoin Tech Terms Virtual Private Network Lithium-ion battery Hack Identity Theft Telephone Notifications Managed IT Digital HIPAA Unified Communications Current Events Google Docs Processors Excel Solutions Security Cameras Access Securty Trends Supply Chain Management Mobile Technology Value Devices Cyber security Shortcuts Time Management Business Owner Customer Resource management Organization Music Public Cloud Domains Fileless Malware Smart Devices Tip of the week Audit Spyware Gamification Remote Working Company Culture Regulations Trend Micro Be Proactive Botnet Telephone System AI File Sharing Directions Digital Security Cameras Micrsooft Backup and Disaster Recovery Electronic Health Records Transportation Rental Service Redundancy Flash Cache Content Public Speaking Desktop Wasting Time Accountants eCommerce Modem Workplace Strategies Telephone Systems Unified Threat Management Streaming Media Inbound Marketing Electronic Medical Records Business Growth Workers Videos Database Surveillance Keyboard Printing CCTV Hard Drives Managing Costs Equifax intranet SSID Banking Touchscreen Health IT Google Wallet Electronic Payment Media Deep Learning Wireless Tactics Development Computer Malfunction Shortcut Hard Drive Disposal Employer/Employee Relationships Messenger Emergency Vendor Mangement Username Heating/Cooling Virtual Machine Environment Startup Optimization Social Networking Freedom of Information Smart Technology Business Metrics Windows XP Reviews Hosted Solution Samsung Navigation 2FA Uninterrupted Power Supply Phone System Addiction Webcam email scam Teamwork Books Language Business Mangement Data Storage Society Mobile Security Hypervisor Legislation News Medical IT User Tip Shopping Tablets Reading Evernote Paperless Monitors Network Management Visible Light Communication SQL Server Google Calendar PCI DSS Windows 8 Supercomputer Licensing Proxy Server Gig Economy Computer Accessories Emails Humor Fake News Supply Chain Virus Relocation Business Communications Displays Staffing Service Level Agreement Internet Service Provider Advertising Motion Sickness Computing Infrastructure Azure Device security Managed IT Service Comparison Work/Life Balance Google Drive Management Regulations Compliance Tech Support IP Address Wireless Headphones Memes Microsoft Excel Workplace Knowledge Tech Human Resources Corporate Profile Going Green Net Neutrality Business Cards In Internet of Things Television Telephony Error Financial Data Employer Employee Relationship Bookmark Risk Management Network Congestion Cabling IT Scams Hacks Reliable Computing Term Google Apps Writing Tablet Recovery Download G Suite Competition Piracy HTML Mouse VoIP Troubleshooting Telework Tracking Browsers Smartwatch Nanotechnology Communitications Entrepreneur Microsoft 365 Cables LiFi Scalability Google Play Documents Upload Procurement Web Server Application Software License Business Intelligence Administrator SharePoint Text Messaging Social Network FinTech Proactive IT Digital Payment Data Analysis CES Worker Screen Reader IT Assessment Point of Sale Bring Your Own Device

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?