Overview on Social Engineering- Cyber Jaagrookta Diwas
Table of Contents
Cyber Jaagrookta Diwas: Stay Alert, Stay Secure – Beware of Social Engineering!
On this Cyber Jaagrookta Diwas, let us raise awareness about the growing threat of social engineering attacks. Cybercriminals often exploit human emotions—such as fear, curiosity, sympathy, or pride—to manipulate individuals into revealing confidential information or performing harmful actions.
This Cyber Jaagrookta Diwas, we are spreading awareness against Social Engineering. Cyber Criminal often rely on human emotion like fear, curiosity, sympathy or pride to trick their victims. Cyber Criminals use social engineering tactics to trick people into revealing confidential information like cards details, log in credentials, Transferring money etc. It’s Easy to Stay Safe Online STAY VILGILANT! PREVENT FRAUD!!
What is Social Engineering?
It is a manipulation technique used by cyber attackers to trick people into revealing sensitive data like card details, login credentials, or even transferring money—without using technical hacking tools.
Modus Operandi of Social Engineers
-
Research & Targeting: Attackers gather information about the target using sources like social media, company websites, or public records. This helps them personalize the attack and make it seem authentic.
-
Establishing Trust: The attacker impersonates a trusted person or organization—via email, phone call, or sometimes even in person—to gain the victim’s confidence.
-
Manipulation & Deception: Using psychological tactics like urgency, fear, curiosity, or authority, attackers pressure the victim into acting without verification.
-
Execution of the Scam: The victim is tricked into:
-
Clicking malicious links or attachments (Phishing)
-
Sharing sensitive data like login credentials or bank details
-
Transferring money (Business Email Compromise)
-
Downloading malware or granting remote access
-
Precautions to Protect Yourself
-
Be Skeptical of Unsolicited Requests: Treat unexpected emails, messages, or calls—especially those requesting sensitive information—with caution.
-
Always Verify Identities: Confirm the identity of the requester using official or known contact channels before taking any action.
-
Limit Public Exposure of Information: Avoid oversharing personal or company details on social media or public platforms. Attackers use this data to tailor their scams.
-
Secure Your Devices: Lock your devices when unattended and always log out from systems when not in use.
**********************************************************
If this article has helped you in any way, i would appreciate if you could share/like it or leave a comment. Thank you for visiting my blog.
Legal Disclaimer:
The information / articles & any relies to the comments on this blog are provided purely for informational and educational purposes only & are purely based on my understanding / knowledge. They do noy constitute legal advice or legal opinions. The information / articles and any replies to the comments are intended but not promised or guaranteed to be current, complete, or up-to-date and should in no way be taken as a legal advice or an indication of future results. Therefore, i can not take any responsibility for the results or consequences of any attempt to use or adopt any of the information presented on this blog. You are advised not to act or rely on any information / articles contained without first seeking the advice of a practicing professional.