The Art of Shoulder Surfing

Shoulder Surfing – Another method social engineers use to gain access to information is shoulder surfing. A shoulder surfer is skilled at reading what users enter on their keyboards, especially logon names and passwords. This skill certainly takes practice, but with enough time, it can be mastered easily. Shoulder surfers also use this skill to read PINs entered at ATMs or to detect long distance authorization codes that callers dial. Shoulder Surfing – ATM theft is much easier than computer shoulder surfing because a keypad has fewer characters to memorize…

Read More

What is Social Engineering?

Social engineering is the art of convincing people to reveal confidential information. Comman targets of social engineering include help desk personnel, technical support executives, system administrators, etc. Social engineers depend on the fact that people are unware of thier valuble information and are careless about protecting it. What is Social Engineering? Prior to performing social engineering attack, an attacker gathers information about the target organization from various sources such as: Official websites of the target organizations, where employees’ IDs, names, and email addresses are shared. Advertisement of the target organization…

Read More

What is Phishing?


Phishing Process is a technique in which Fake Email which looks like legitimate email is sent to target host. When the receipent opens the link, he is enticed for providing information. Typically, readers are redirected to the fake webpage that resembles an official website. The user provides all sensitive information to a fake website believing as an official website because of its resemblance. Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading…

Read More