To protect yourself against social hacking, keep your information private and your accounts secure. This information might not itself seem very valuable, but for many services like AOL, it is all that is needed to gain access to an account.Īnd with access to a person’s primary email account, it is incredibly easy to reset the passwords to many other accounts, like social media or even financial accounts. The information they obtained from Verizon included a backup phone number, the last digits of his credit card, his AOL email address, and Brennan’s four-digit PIN with Verizon. This process possibly required a lot of knowledge about the inner workings of Verizon, but none that wouldn’t be accessible by a low-level employee. ![]() They did this by claiming they had Brennan on the phone and he wasn’t able to access the database on his own. The hackers then posed as Verizon employees to trick other Verizon employees into giving them manual access to the Verizon database. ![]() Through reverse phone lookups with various phone providers, they determined that Brennan was a Verizon customer. To pull off their hack, the teen and his associates first got hold of Brennan’s phone number. It is easy to imagine what damage this information can cause beyond just the compromise of an email account. Inside Brennan’s email account, the hackers found, among other things, Brennan’s application for his security clearance, including criminal records, medical records, and details about the personal relationships of not just Brennan but the members of his immediate family. In one of 2015’s most sensational hacking stories, a teenaged hacker and two associates got access to the private email account of CIA director John Brennan-mainly through the use of social hacking techniques. Often enough the Internet is used solely as a treasure trove of information, which is then used against you or your organization through deception or redirection through other channels, such as on the phone or in person. ![]() When hackers breach even the most complicated security systems, they often do so with minimal use of a computer. Recommended + Security & Privacy The 6 Most Common Social Hacking Exploit Techniques
0 Comments
Leave a Reply. |