Book Image

Joomla! Web Security

Book Image

Joomla! Web Security

Overview of this book

Table of Contents (16 chapters)
Joomla! Web Security
Credits
About the Author
About the Reviewer
Preface

End Users


How can you as an end user protect yourself from attack? There are a few things that we have covered to stress their importance. Let's review a few others.

Social Engineering

It is an accepted fact that the weakest link in the security chain is the natural human willingness to accept someone at his or her word. We want to believe the person on the other end of the phone who is pleading for help. They "lost" their password, and they must get that report done, else their boss is going to kill them! Who hasn't been in that spot? Your heart goes out to them and this small act of kindness to a fellow human leaves many of us vulnerable to an attack.

Phishing scams are the current "in thing" to try and fleece money or information from people, yet this is only the latest "con-game" available. Conning people into giving up something is as old as the human race. Social engineering is non-technical, and yet an effective attack against your website or company infrastructure. If the would...