Social engineering attacks use deception to manipulate individuals into divulging confidential or personal information, including fake web sites and pretending to be a trustworthy person by email and on the phone.
In a social engineering attack, an attacker uses human interaction to manipulate a person into disclosing information. Social engineering attacks attempt to exploit our natural tendency to trust others in order to steal your information. The stolen information can be used to commit fraud or identity theft.
Spoofing is the act of creating a fake web site to mislead individuals into sharing sensitive information. Spoofed web sites are typically created to look exactly like a legitimate web site published by a trusted organization.
Prevention Tips
Phishing is when an attacker attempts to acquire information by masquerading as a trustworthy entity in an electronic communication. Phishing attacks are typically carried out through email, instant messaging, phone calls, and text messages.
Prevention Tips
Contact us immediately if you suspect you have fallen victim to a social engineering attack and have disclosed information concerning one or more of your accounts. Regularly monitoring your account activity is a good way to detect fraudulent activity.