Alert Africa | Humans, the most common vulnerability used to conduct cybercrime
5127
post-template-default,single,single-post,postid-5127,single-format-standard,ajax_updown_fade,page_not_loaded

Humans, the most common vulnerability used to conduct cybercrime

Humans, the most common vulnerability used to conduct cybercrime

Posted by Msizi in cyber espionage

Humans, the most common vulnerability used to conduct cybercrimeAlthough cybercrime is sophisticated in order to break in to computer systems, the human vulnerability is the most common one used, says a security expert.

Ghareeb Saad, senior security researcher with the Global Research and Analysis Team, Middle East, Turkey and Africa at Kaspersky Lab told News24 that, “Often the first kind of vulnerability exploited by attackers is the human one. They use social engineering techniques to trick individuals who work for an organisation into doing something that jeopardises corporate security.”

Over the past few months, there have been several reports on how cyber criminals have conducted a number of high profile intrusions into corporate networks.

The victims include retail giant eBay and a number of companies, including US military contractors, after their systems were hacked.

The hackers have been successful in infiltrating corporate networks by using seemingly simple techniques such as sending e-mails designed to appear as if sent from senior management.

Chinese officials have been indicted by the U.S authorities over cyber spying, saying that social engineering played a far greater role in gaining access to critical systems than superior programming.

Saad said, “People are susceptible to such approaches for various reasons. Sometimes they simply don’t realise the danger, or they are taken in by the lure of ‘something for nothing’, or lastly they cut corners to make their lives easier – for example, using the same password for everything.”

2014 Trustwave Global Security Report verified this claim after they found that the most common password was “123456”, followed by “123456789”, “1234” and “password”.

For more information click here.

04 Jun 2014 no comments

Sorry, the comment form is closed at this time.