Skip to content

Latest commit

 

History

History
13 lines (7 loc) · 854 Bytes

2.md

File metadata and controls

13 lines (7 loc) · 854 Bytes

Social Engineering

Description:

Social engineering techniques rely on human vulnerabilities, not the technical prowess of a potential hacker. Social engineering is used to gain (unauthorized) access to sensitive data, cryptocurrency wallets, or accounts, or to induce victims to download malware onto computers and networks to enact further damage.

Even if a protocol and its interface are secure, malicious users can log into Discords and Telegrams, pretending to be core team members and trick users into accessing fake websites or opportunities.

Reference:

https://twitter.com/puntium/status/1522373216378912768

https://www.gemini.com/cryptopedia/social-engineering-definition-attack-examples