ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Halloween, Hackers are Pretending to Be You

This Halloween, Hackers are Pretending to Be You

Halloween is a great time for people of all ages to let loose and embrace their spookier, darker side--even though they aren’t. For hackers, however, every day is like Halloween, but with ill intentions. Hackers will pretend to be someone they’re not in order to scam you out of sensitive data or personal information. By identifying their tricks, you can keep hackers from getting their treats.

The aforementioned tricks are typically characterized as social engineering tactics, where a hacker will trick users into thinking that they’re a trusted organization, or even someone within their own business. Unlike those who participate in Halloween dressed in silly costumes, it’s not so easy to distinguish a social engineering attack from normal everyday occurrences. This is what makes the trick so convincing. Therefore, it’s imperative that you know what to look for, and how to address it properly. Also, in the same way you check your kid’s trick-or-treat candy for anything that might be harmful, you need to view unsolicited digital communications with a degree of healthy skepticism.

The unfortunate fact is that social engineering attacks (including phishing scams) work, which is why they’re commonly used by hackers. Even the most vigilant user can fall victim to a social engineering scam, which prompts people to wonder what makes a social engineering attack so effective. Researchers from the University of Erlangen-Nuremberg in Germany decided to pursue this thought and performed research into what makes people want to click on suspicious links.

Zinaida Benenson presented the university’s findings at the most recent Black Hat convention in Las Vegas. It was discovered that the success of social engineering attacks was largely due to the hacker understanding the circumstances of the scam and personalizing the link to appeal to the victim at that specific time: “By a careful design and timing of the message, it should be possible to make virtually any person to click on a link, as any person will be curious about something, or interested in some topic, or find themselves in a life situation that fits the message content and context."

In other words, proactive training and education aren’t enough. Even the best employee could click on a link that aligns with their personal interests. ZDNet uses the example of an employee who has recently attended an event and is then sent a link to an online photo album containing memories of the event. The user will want to click on the link to see what the photos are, regardless of who it’s from. Once he has done so, the hacker succeeds; he has appealed to the natural curiosity of the user, and thanks to the timing of the message, the user is almost guaranteed to click it.

Another common example is an employee who is experiencing persistent technical trouble with their workstation. They might receive an email from “tech support” claiming that the problem can be resolved by downloading remote access software. The frustrated employee will click on the link because it fits their current needs and situation and because users typically trust tech support.

Just like how it takes energy to build an impressive Halloween persona, these hackers require immense time and preparation in order to successfully pull off a social engineering scam. These types of personalized attacks make social engineering scams challenging to protect yourself against. Yet, not all hope is lost. Educating your employees on security best practices and implementing spam blocking solutions designed to eliminate spammy emails may be the best way to avoid a fright.

Have a safe and happy Halloween, from all of us at ClearView IT.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Communication Data Recovery Managed IT Services Quick Tips Productivity Social Media Users VoIP Mobile Device Automation Tech Term Windows 10 Facebook Business Continuity Disaster Recovery Passwords Holiday Covid-19 Windows 10 IT Support Browser Apps Managed Service Cloud Computing Outsourced IT Miscellaneous Internet of Things Managed Service Provider Data Management Remote Work Saving Money Operating System Government Gadgets Networking Windows Artificial Intelligence Workplace Strategy Managed IT services WiFi Bandwidth Business Technology Information Mobile Device Management Encryption App Remote Server Virtualization Blockchain Spam Budget Apple Gmail Information Technology Office History Employee/Employer Relationship Two-factor Authentication Office 365 Analytics Conferencing Wi-Fi BDR Cybercrime Big Data Access Control Data Security Health Save Money Remote Monitoring Remote Computing Hacker Voice over Internet Protocol IT Management Compliance Vendor Training Cost Management Help Desk Hacking Employer-Employee Relationship Document Management Patch Management Hiring/Firing Data loss Outlook Project Management Money Password Mobile Office Customer Service Unified Threat Management Firewall Managed Services BYOD Augmented Reality Computing Word Vendor Management Applications Hard Drive IBM Website Vulnerabilities Search... Best Practice Legal Retail Data storage Alert Travel Maintenance User Virtual Reality Windows 11 Social Engineering Cryptocurrency Remote Workers Black Market Social Cleaning Sports SaaS DDoS Windows 7 Websites Chrome Robot Free Resource Mobility Meetings Data Breach How To iPhone Google Maps Education Cortana Scam Mobile Computing Content Filtering Marketing Router Twitter VPN Running Cable Monitoring Healthcare Law Enforcement Update End of Support Storage The Internet of Things Printer YouTube Paperless Office Laptop Antivirus Bluetooth Physical Security Downtime Safety Excel Distributed Denial of Service Professional Services Office Tips Private Cloud Memory Virtual Desktop Start Menu Experience Managed Services Provider Downloads Computer Care Virtual Assistant Vulnerability Virtual Private Network Politics Machine Learning Settings Software as a Service Data Protection PowerPoint Disaster Current Events Solid State Drive Administration Solutions Processor Presentation Lithium-ion battery Specifications Images 101 Chromebook Integration IT Consultant Drones Display Automobile Customer Relationship Management Processors Tech Terms Co-Managed IT Multi-factor Authentication Employees How To Entertainment Microchip Avoiding Downtime Managed IT Flexibility Digital Holidays Saving Time Taxes Computers Bitcoin Hack Identity Theft Cooperation Wireless Technology Video Conferencing Notifications eWaste Telephone Unified Communications Virtual Machines Google Docs HIPAA Computer Repair Licensing Environment Cache Social Network PCI DSS Heating/Cooling Screen Reader Gig Economy Humor Social Networking Unified Threat Management Data Analysis Music Workers Windows XP Security Cameras Trends Business Communications Mobile Technology Internet Service Provider Azure Managed IT Service Printing Business Owner Customer Resource management CCTV Devices Regulations Compliance Tip of the week Botnet Memes Touchscreen Fileless Malware Micrsooft Gamification Computer Malfunction Human Resources Company Culture Supply Chain Net Neutrality Rental Service Emergency Flash Vendor Mangement Telephone System Regulations Financial Data Backup and Disaster Recovery Risk Management IT Telephone Systems Directions Business Growth Samsung Uninterrupted Power Supply Content Webcam Google Apps Staffing Desktop Workplace IP Address Business Mangement Inbound Marketing Electronic Medical Records Accountants Telework Tablets Database Smartwatch Communitications Banking Microsoft 365 Google Wallet Deep Learning Scams Procurement Messenger FinTech Google Calendar Health IT Supercomputer Equifax Tactics CES Hard Drive Disposal IT Assessment Business Metrics Virus Electronic Payment Hosted Solution Value Username Motion Sickness Recovery Cables Supply Chain Management Competition Books Organization Freedom of Information Cyber security Comparison Language Google Drive Society Startup LiFi Phone System Addiction email scam Smart Devices Entrepreneur Navigation Reading Knowledge Monitors Corporate Profile Visible Light Communication Documents Mobile Security Point of Sale Remote Working Application AI News Trend Micro Business Intelligence Television Telephony User Tip Windows 8 Employer Employee Relationship Legislation Cabling Network Management Digital Security Cameras Shortcuts Electronic Health Records Transportation Evernote Relocation Wasting Time Displays Tablet Advertising G Suite Securty Domains Fake News eCommerce Mouse Work/Life Balance Modem VoIP Proxy Server Tech Support Tracking Computer Accessories Emails Service Level Agreement Videos Computing Infrastructure Be Proactive Surveillance Managing Costs Management Web Server Device security Wireless Headphones Microsoft Excel In Internet of Things SharePoint SSID Digital Payment Tech Network Congestion Worker Going Green Media Business Cards Workplace Strategies Development Hacks Employer/Employee Relationships Reliable Computing Virtual Machine Writing Access Error Public Speaking Reviews Optimization Time Management Bookmark Public Cloud Streaming Media Term Download 2FA Piracy Keyboard Teamwork Scalability Hypervisor Audit Spyware Troubleshooting HTML Data Storage Hard Drives Nanotechnology Shopping Administrator intranet Text Messaging Medical IT Browsers Proactive IT File Sharing Google Play Upload Paperless Wireless Software License Smart Technology Shortcut Bring Your Own Device SQL Server Redundancy

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?