Social engineering in security is the act of Manipulating individuals into divulging their confidential information.This method has been used by many hackers to gain access and also use individuals information for fraudulent act.
Techniques- Baiting: This one is something i never expected. The hacker Purposely drops a Malware infected usb, floppy disk or CD rom in strategic places where is common for people to forget things like a public toilet or bus and rely on victims curiosity and greed to take actions. The drives are usually tagged with something that would arouse the victim curiosity or greed to plug into their system to find out whats inside. This would give them access to the computer to perform any fraudulent act or collect victims personal datas
Now what brought about my research on social engineering was a method called sim Jacking.
Sim SwappingTo be honest i never knew it was possible to gain a person 2FA code without having access to the sim. I have always be paranoid with leaving my Mobile number online and this made me affirmed by decision. KYC is dangerous in the hands of reputable platforms but more so in individuals hands. Binance p2p merchant (some) usually ask for their customers number and this number can make one vulnerable to sim swapping attack.
Known VictimThis was used against the former Twitter CEO Jack Dorsey which was quite embarrassing for one so renowned. Proof that been popular or rich doesn't protect your data. You have to be active about it and not passive.
Sim swapping uses the weakness of 2FA and two steps verification since they are sent via sms or call to the specified number. This method start by the hacker gathering confidential information about the victim either through phishing or social engineering.the fraudster contacts the victim's mobile telephone provider.The fraudster convince the telephone company to port the victim's phone number to theirs. This would enable them receive the OTP code that can be used to login in place of the original owner. It can even be used as a method to gain a log in password through forgot password setting.
This
https://haveibeenpwned.com/ can be used to check your Internet presence using email, phone number and linked online services.
VPN especially paid ones can help reduce your Internet presence. Torr is also an important privacy method.
You might think why should i protect my privacy or keep my internet presence secure when i barely have any funds to loss. Don't forget collecting your data can make it easy to impersonate you of a crime you know nothing of. Medical report ain't excluded too.
As it is said
Prevention is better than sacrifice
Protect your datas
Improve security continuously.
"At the end of the day, the goals are simple: safety and security"-
Jodi Rell.
The thing is,I have read quite some thread on security but never knew it was possible to deceive ones network provider to transfer a phone number to another. There are alot of threads that have been created in the forum to assist with privacy.
You can tell by my text am kinda lazy so you can check it out via the search button (search privacy).
I am sure others would drop their opinions as well as link to said thread.
Thanks in Advance.