Unknown callers and self-googling

November 2018 Cyber Security

Ask most security experts and they’ll tell you that their number one rule for phone calls: Unless the caller is a saved contact in your phone, don’t answer. Hackers use many tricks to attempt to record your voice or lure you to answer certain questions through a phone call. Instead, allow unknown callers to leave a message and you decide if you want - or need - to call back.

If you aren’t among the curious few who already do this regularly, Google your name every now and then to see what the world knows about you. You may be surprised at the amount of information about you. Don’t look only at the first page of search results — look through several pages to see what is known about you.

Google your name along with a keyword. For example, search for your name and your employer or school, and see the list of things that you either have participated in or have been identified with, as well as what someone else has shared about you. Hackers use this information to figure out things about you. This way, they can use targeted attacks to gain access to your personal information.

Here is an example. Let’s say you are listed as a Xerox employee on your LinkedIn profile. With very little research, a hacker can figure out when the Xerox benefits open enrolment occurs. With that information, they may target you during the company’s open enrolment period with phone calls or email, asking you to log into seemingly harmless sites. If you are not careful, you may enter the wrong site and submit your secure credentials.

For more information contact Tanya Moodley, Bytes Document Solutions, +27 11 928 9111, tanya.moodley@bdsol.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Where are your crown jewels?
June 2019, Wolfpack Information Risk , Commercial (Industry), Cyber Security, Security Services & Risk Management
Understanding what data they store and analyse is gaining increasing urgency for organisations that are now accountable to new(ish) privacy regulations such as the GDPR and our PoPIA.

Read more...
Axis 7th generation ARTPEC chip
June 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
Axis has launched its 7th generation ARTPEC chip, optimised for network video, to improve all the signature Axis technologies created to address difficult light conditions.

Read more...
Critical vulnerability in Windows OS
June 2019 , Cyber Security
Vulnerability allows remote code execution by an attacker directly from the network using the Remote Desktop Protocol (RDP) in remote desktop services that affects older versions of Windows.

Read more...
Password awareness critical
June 2019, Kaspersky Lab , Cyber Security, Security Services & Risk Management
A recent study revealed that digital identity data and information holds significant value to cybercriminals – who craft ways of gaining this data and exploit it on the dark Web for as little as $50.

Read more...
Redstor rescues vets hit by ransomware attack
June 2019 , Cyber Security, Healthcare (Industry)
Redstor, a provider of data management solutions, has come to the rescue of a vet hit by a ransomware attack.

Read more...
Kaspersky Lab to open office in Kigali, Rwanda
June 2019, Kaspersky Lab , News, Cyber Security
Kaspersky Lab has announced plans to open a new office in Kigali, Rwanda, to support the rapid growth of its business in East Africa.

Read more...
SIM swap fraud expands
June 2019 , News, Cyber Security, Financial (Industry)
A new wave of attacks targeting financial services and online services have become very common in South Africa and the wider region.

Read more...
Tackling the insider threat
June 2019, Secnovate , News, Cyber Security
Secnovate and its strategic partner, Condyn, has run a series of executive briefings on insider threats, which represents a growing and important threat vector for all organisations, big and small.

Read more...
Netgear Armor on Orbi Wi-Fi
June 2019, Duxbury Networking , Home Security, Cyber Security, IT infrastructure
Netgear has announced the worldwide availability of Netgear Armor Cyber Threat Protection, powered by Bitdefender, on Orbi Wi-Fi mesh systems, to protect home IT and IoT devices.

Read more...
Six best practices for creating secure passwords
June 2019 , Home Security, Cyber Security
Passwords are like toothbrushes: you want to choose a good one, never share it, and replace it quarterly.

Read more...