From the course: Cybersecurity at Work

Scenario: Voice phishing

- While advances in technology have enabled hackers to craft more sophisticated phishing attacks, at the end of the day, it's still one person trying to ask another to willingly give over information. Watch as this hacker tries to convince this employee to give him her password. - Hello, Nia. Can I have your password? - No. - This is the IRS. What is your password? - No? - There are two things to look out for in a typical phishing scenario. The first is deception, and the second is a sense of urgency. Hackers will try to use fear and warning to get someone to respond. - Your account is 90 days overdue and it's going to collections. In order to avoid this legal jeopardy, contact our department with your account number and password. - Whoa, this sounds serious. Better send than my account and password. - There's a special type of phishing called spear phishing that targets a specific user. Watch as this hacker uses information they found on social media to sound more convincing. - To Nia, from your CEO. Hey Nia, we need help with that grant proposal. Can you send over our company's W-2s with their social security numbers. Signed, CEO. - Oh, this is a really big project. I got to get those W-2s and social security numbers over to them, don't I? - Don't worry. This is the same thing. Look out for urgency, deception, and impersonation. - But the email says it's from the CEO. - Hackers can try and forge from and reply to email addresses in order to impersonate a trusted person. Don't fall for it. - This is your IT department. Nia, you downloaded malware and infected the entire network. Come on! Log in with your password right away. Urgent! - Wait. IT department! - Talk to me. - Did you guys just send me an email about malware infecting the network? - Nope. That sounds like a phishing email. - Thanks, IT department. - Does she always wink to camera? As you can see, if you just keep an eye out for deception, impersonation, and urgency, then you can avoid falling victim to phishing attacks. Nice try, buddy.

Contents