Announcement
Collapse
No announcement yet.
An alternative social engineering approach
Collapse
X
-
Re: An alternative social engineering approach
Originally posted by bascule
The same reaction occured here in the office the other day. Someone found an "unknown" USB drive and immediately plugged it in to "see what was on it.""\x74\x68\x65\x70\x72\x65\x7a\x39\x38";
-
Re: An alternative social engineering approach
Wouldn't a decent "on-access" scanner pick up the trojan as they start looking through the files. Or is the credit union functioning with that little of protection? I guess I get really surprised at how weak some of these corporate defenses are. You would think a bank would be more secure in their technology not just the physical aspect of vaults and alarms.I hate to advocate drugs, alcohol, violence, or insanity to anyone, but they've always worked for me. - HST
Comment
-
Re: An alternative social engineering approach
Originally posted by arashi_kageWouldn't a decent "on-access" scanner pick up the trojan as they start looking through the files.
Or is the credit union functioning with that little of protection? I guess I get really surprised at how weak some of these corporate defenses are. You would think a bank would be more secure in their technology not just the physical aspect of vaults and alarms.
You could change the setting to just about any other industry and I'd be willing to bet that at least 85% of the time you'd get exactly the same result. This doesn't mean that the financial industry is more or less secure than any other, just that it happened to be used as the backdrop to all of this - and it was likely chosen specifically for mild shock value.
Comment
Comment