Chapter 3
Defending from Social Engineering Attacks
Section 8
How to Outfox Keyloggers
In this section, we’ll deep into the dark secrets of social engineering attacks. We’ll consider why social engineering has mostly evolved in the digital form – phishing emails. Social engineering is different from other kinds of cyberattacks, because it targets not at computers’ vulnerabilities but on human brain’s weaknesses in the first turn. That’s why even a guru of IT-technologies can fall a prey of such attacks. Social engineering relates to cyber psychology sphere, and after learning this section, you’ll discover how to protect from these dangerous attacks in the easiest and fastest ways possible.