Connect with us


Social Engineering: A Major Threat to Your Privacy

Social Engineering

Protecting your privacy takes more than running a privacy-oriented Linux distro and using a password manager. Many security experts believe the weakest link in any system is the human that operates it. In this article, we’ll learn what social engineering is and why it is such a threat. Then we’ll look at some of the […]

Social Engineering: A Major Threat to Your Privacy was originally found on Blokt – Privacy, Tech, Bitcoin, Blockchain & Cryptocurrency.

Republished by Plato



Social Engineering
Social Engineering

Protecting your privacy takes more than running a privacy-oriented Linux distro and using a password manager. Many security experts believe the weakest link in any system is the human that operates it.

In this article, we’ll learn what social engineering is and why it is such a threat. Then we’ll look at some of the social engineering attacks that bad guys can use against you, both online and offline. We wrap it up with a few tips for protecting yourself from social engineering attacks.

What is Social Engineering?

Merriam-Webster defines social engineering as the “management of human beings in accordance with their place and function in society.” That sounds a little creepy in itself. But in recent years, the phrase has taken on a more manipulative, sinister meaning.

Today, social engineering means something like “manipulating people to give you confidential information.” When we talk about social engineering here, this is the sense that we’re using.

Why Social Engineering is Such a Threat

Criminals use social engineering because it is easier than hacking into a computer system. Tricking someone into telling you something they shouldn’t is relatively easy. Most people are trusting of others.

It doesn’t matter how secure your computer system is. Or where you stashed your personal documents. Or how many guards are in front of your offices. Social engineering attacks sidestep all that.

Famous ex-hacker Kevin Mitnick often used social engineering attacks to get into “secure” computer systems.

“Anyone who thinks that security products alone offer true security is settling for the illusion of security.” – Kevin D. Mitnick, The Art of Deception: Controlling the Human Element of Security

Criminals use social engineering attacks, both online and offline. Now we’ll look at some of the most common types of attacks and what you can do to defend yourself against them.

Let’s start with some of the online social engineering attacks beloved by hackers.

“A hacker is someone who uses a combination of high-tech cyber tools and social engineering to gain illicit access to someone else’s data.”John McAfee

Some Online Social Engineering Attacks

Here are a few of the most common online social engineering attacks:

  • Phishing
  • Spear Phishing
  • Baiting


According to the Department of Homeland Security website, a phishing attack “uses email or malicious websites to solicit personal information by posing as a trustworthy organization.”

You’ve seen this kind of attack. We all get emails from official-sounding organizations claiming there’s a problem with our account, or they need to verify our credit card information.

The goal is to get you to click on the link in the email. That link will take you to a legitimate-looking, but phony, website for the organization. The website will be set up to trick you into entering your credit card data, Social Security number, or whatever it is that the crooks want to steal.

Spear Phishing

Spear phishing is a type of phishing attack where the attacker customizes the phishing email using personal information about the intended victim. In December 2018, the US Internal Revenue Service (IRS) published a warning about several spear-phishing scams.

These scams were meant to gather the information that goes on IRS Form W-2. The target for these scams was small businesses. The bad guys would use the information to open credit card accounts, file fraudulent tax returns, open lines of credit, and so on.

Spear phishing attacks rely heavily on Pretexting attacks. We cover Pretexting attacks in the next section.


Baiting attacks are somewhat similar to phishing attacks. The difference is that baiting attacks offer the target something they want instead of resolve a problem. In these kinds of attacks, you might get offered free music, copies of new movies, or any other kind of prize. To get the prize, you would be required to enter whatever type of personal information it is that the crook is after.

Baiting attacks can also occur offline. One such attack involves leaving USB sticks lying around somewhere employees of a target company might find them. The chances are good that someone will pick one up and plug it into their computer, letting whatever malicious software it contains loose inside the organization.

Some Offline Social Engineering Attacks

Here are some common types of offline social engineering attacks:

  • Pretexting
  • Tailgating/Piggybacking
  • Vishing (Voice Phishing)


Pretexting is using some form of a lie to trick someone into giving up information they should not share. Pretexting attacks can be run both online and offline. They are often used to get the personal information needed to set up Spear Phishing attacks.

An offline example might be someone who calls you, pretending to be from a lawyer’s office. You’ve just inherited a lot of money from a distant relative. All you need to do is provide certain information to prove your identity, and the lawyer will wire you the money. The pretext for the call is the phony inheritance.


Tailgating usually involves passing through some sort of electronic security system using someone else’s access. Someone following close behind you when you pass through electronic security might not be a fellow employee at all. Instead, they might be someone tailgating on your access to go somewhere they don’t belong.

Vishing (Voice Phishing)

Vishing, or Voice Phishing, is the offline equivalent of a Phishing attack. There are several versions of this attack, but all use the telephone system. They aim to get the victim to divulge a credit card number or some other personal information in response to an official-sounding phone call.

These scams usually use VoIP (Voice over IP) technology to simulate the automated phone system that a real company might use. Phone systems used to be considered safe and trustworthy, making people more vulnerable to Vishing scams.

How to Defend Yourself from ONLINE Social Engineering Attacks

We’ve looked at some of the more common online social engineering attacks in use today. But what can you do to protect yourself from them?

Here are some practices that will reduce your chance of getting scammed:

  • Don’t open unexpected email attachments. If you receive an unexpected attachment, the chances are good that it is malicious. Contact the company IT department (if at work). If not at work, contact the sender (if you know them). Find out why you received it before opening any unexpected attachment.
  • Look up websites on your own. Remember that phishing-type attacks usually direct you to a fake website. You can avoid their trap by looking up the website address yourself rather than clicking on a link in an email message or attachment. If you do find yourself on a website you are unsure about, check out the URL (the address) that appears in the browser address box. While it is possible to make an exact duplicate of a legitimate website, no two sites can have the same URL. Looking up the company in a search engine should get you to the real site.
  • Never reveal your password to anyone online. No legitimate organization is going to ask a user for their password.
  • Use a VPN for additional privacy when browsing the web.

How to Defend Yourself from OFFLINE Social Engineering Attacks

We’ve also looked at common offline social engineering attacks. Here are some things you can do to protect yourself from offline attacks:

  • Don’t give personal information to callers. This may have been safe many years ago, but is not now. If someone calls you and says they need you to confirm some personal information, hang up on the creeps!
  • Don’t let anyone tailgate you to get past security. Regular criminals or ex-employees have been known to use this technique to get back onsite and steal things or exact vengeance.
  • Always demand an ID from anyone who shows up asking you for information.
  • Never plug anything into your computer if you don’t know where it came from!
Blokt is a leading independent privacy resource that maintains the highest possible professional and ethical journalistic standards.



SOLANAX Private Sale Is On For The Cross-Chain DEX

Republished by Plato



[PRESS RELEASE – Please Read Disclaimer]

The cryptocurrency market has left people wondering about the long-term growth prospects and which cryptocurrency they should invest in. Solanax is an automated market maker (AMM) based on the Solana blockchain, which is set to be a game-changer in the cryptocurrency world.

The SolanaX Platform

After parsing through their team of professionals, whitepapers, their project plans, and unique platform capabilities, there is no doubt that once the platform is up and running in full swing, it will undoubtedly change the way people transact today with its simple interface for the public to trade at a record higher blockchain speed and lower gas fees.

  • There are no time-consuming processes or intermediaries.
  • It offers a very simple interface and lower gas fees while initiating the transactions.
  • Solanax increases blockchain speed and makes it more convenient to transact than its peers in the cryptocurrency market.
  • As Solanax is based on Solana’s Proof-of-History verification concept rather than a Proof-of-Work system (as that of Ethereum’s), it will enable users to leverage Solanax’s phenomenal transaction capabilities (Solanax to handle thousands of transactions in a second as compared to Ethereum’s 15).
  • The most crucial part is that while speeding up blockchain transactions and lowering gas prices, Solanax does not compromise on the security aspect.

The Ongoing Private Sale Of Solanax

Solana blockchain is substantially faster compared to its peers, and the ongoing private sale is an opportunity for crypto enthusiasts and investors to participate in this game-changer prospect.

The private sale is still ongoing until Friday, 25th June.

Total Supply: 80 000 000 SOLD Tokens

There will be 20 Million SOLD Tokens distributed before the CEX listing.

Private Sale: Total available token supply – 10,000,000 SOLD

Period: From 06/06/2021 to 25/06/2021

Token Price: $0.1 with a 3months vesting period

Token Price: $0.15 w/o vesting period

Initial Exchange Offering: Total available supply – 10,000,000 SOLD

Final Words

Solanax aims to revolutionize the DeFi exchange network and enhance efficiency levels to new highs. With DeFi gaining popularity, there is an urgent need for the industry to look beyond the older cryptocurrency platforms like Bitcoin and Ethereum. The sluggish transaction speed is one of the prime reasons for Solanax not preferring the Ethereum-like platforms. Besides, Solanax, with its high blockchain speed, simple interface, and low gas fees, is truly a game-changer for crypto aficionados, and Solanax’s Ongoing Private Sale presents the perfect investment opportunity for investors.


Binance Futures 50 USDT FREE Voucher: Use this link to register & get 10% off fees and 50 USDT when trading 500 USDT (limited offer).

PrimeXBT Special Offer: Use this link to register & enter POTATO50 code to get 50% free bonus on any deposit up to 1 BTC.

PlatoAi. Web3 Reimagined. Data Inteligence Amplifed.
Click here for Free Trial.


Continue Reading


Ethernity CLOUD: Data Confidentiality Backed By Blockchain

Republished by Plato



[Featured Content]

It goes without saying that data confidentiality is one of the hottest topics of the decade. From mega scandals of leaked information to a constant stream of news about large corporations being victims of ransomware, there’s undeniably something lacking in the way data is stored traditionally. For the most part, at least.

The truth is that most users rely on traditional cloud infrastructure. Unfortunately, it has many central points of failure and trust, such as:

  • The centralized nature of the Domain Name System (DNS)
  • The dependency on one or numerous cloud providers for service availability
  • Centralized storage of user information

Blockchain technology and cryptography are quickly becoming a topic that many discuss mainly for its potential to disrupt a range of traditional services – data storage and cloud computing are among them.

Etherenity CLOUD is a project that envisions cloud computing infrastructure to be an environment where the data of users is hosted on a range of systems in a manner that’s both confidential and heavily encrypted. From home computers to professional-grade datacenters, any kind of hardware could be used with Ethernity CLOUD and trust that the information is private while in transition and in general.


Ethernity CLOUD: What is it all about?

If one thing is clear, it’s that centralized data servers have become a primary target for hackers. Less than two weeks ago, CryptoPotato reported that JBS – the world’s largest meat producer, paid $11 million in Bitcoin to ransomware hackers who successfully locked the company out of their data.

Ethernity CLOUD’s infrastructure software is created on top of open-source services and technologies, and the migration from standard, centralized cloud providers to it is relatively simple. This comes as a difference to other decentralized hosting solutions, which tend to be rather complex in their attempts to reinvent the wheel.

The main purpose of the project is to provide blockchain infrastructure to participants so they can run cloud software in a decentralized manner, to rent out their idle or extra hardware, and so forth – all this while also providing incentives for decentralized cloud application developers.

Data Confidentiality and Encryption

Ethernity CLOUD’s architecture is designed in a way to favor the most secure encryption and hashing algorithms. At the same time, it keeps the overhead low in order to prevent performance degradation.

The information that’s being exchanged across the network is encrypted, and the ecosystem is designed in a way that prevents the decryption of information in transit, even with the most advanced cryptographic attacks, including brute forcing and collusion.

Naturally, the encryption of the data at rest is also equally important to Ethernity CLOUD, and it was designed on a trustless business model. The information is stored across the network. However, decentralized cloud service providers are unable to access, read, modify, or even interfere in any way with the node that runs on their machine.

Members of the network, by default, are considered untrustworthy – as it is with other blockchain networks. The software code enforces and ensures the trust, which reassures the decentralized cloud users about the safety of their data.

In turn, all of the above provides ground for the following benefits:

  • Ethernity CLOUD is crucial for freedom of speech in the current internet environment where censorship is prevalent.
  • It can be used as a base infrastructure for an online library.
  • It can be the answer to competitive decentralized services or web applications that demand high availability.
  • Can guarantee high availability of online resources through avoiding single points of failure.

Binance Futures 50 USDT FREE Voucher: Use this link to register & get 10% off fees and 50 USDT when trading 500 USDT (limited offer).

PrimeXBT Special Offer: Use this link to register & enter POTATO50 code to get 50% free bonus on any deposit up to 1 BTC.

PlatoAi. Web3 Reimagined. Data Inteligence Amplifed.
Click here for Free Trial.


Continue Reading


Euro 2020: Earn As You Watch

Republished by Plato



[PRESS RELEASE – Please Read Disclaimer]

Over the years, the European Championship has always been an exciting competition to look forward to for fans of competing nations and football lovers worldwide. There is the assurance of highly entertaining, unforgettable, and thrilling games as different countries compete for continental glory.

Euro 2020 has undoubtedly met expectations and fulfilled some of those promises, with so much more in the bag as the competition progresses, nearing the knockout stages. Teams like England, Italy, Netherlands, Denmark, Austria, Wales, and Belgium have booked their spots in the next stage, while France, Portugal, Germany, and Spain, known favorites, are yet to qualify.

Building on an impressive run of games under Roberto Mancini, Italy has a flawless run as they top their group with perfect stats. The Netherlands also has an excellent record as they pose a force to reckon with in this edition of the competition.

Belgium also showed class by maintaining a perfect record in the group stage, while Denmark, Austria, and Wales took advantage to book their spots in the next phase of the competition.

As the Euro draws near its most intense, dramatic, and thrilling peak, 1xBit, a leading crypto sportsbook and online casino, has a well-packaged competition, which is on the same plane of intensity as Euro 2020, for all viewers and sports lovers alike.

This competition is EUROMANIA. It is as fun as the name suggests. More importantly, it is highly rewarding!

1xBit EUROMANIA Competition

1xBit EUROMANIA lottery is a carefully designed competition for football lovers and viewers of Euro 2020. As the competition has its favorites, so does EUROMANIA. Many people have significantly benefited from this competition, so you should not be left out, as there are tremendous and handsome prizes yet to be won.

Additionally, this lottery is different from any other you have seen before because joining it allows you to earn crypto as you bet on the Euro. There are various sporting events, vast selection options, and mouth-watering odds.

The steps to joining are simple and direct. Log on to 1xBit, create an account, make a deposit, bet on the Euro, collect lottery tickets and win amazing prizes!

Benefits of Choosing 1xBit

1xBit is a unique betting platform distinct from others because it offers users a fantastic chance of receiving so many benefits. These benefits include:

  • Welcoming Bonus: As a new user, you get the opportunity of earning yourself a reward of 7 BTC as a welcome bonus. This reward is activated after your 4th deposit on the platform.
  • Anonymity: This is yet another benefit you enjoy using the platform. 1xBit does not require any personal information to get started.
  • Instant Payout: You get the chance to have your account funded as soon as you win. No time is wasted in processing your funds as you get them instantly.
  • Multi-currency Account: Whether you have Bitcoin, ETH, XRP, or any other supported altcoin, there is nothing to worry about as you can transact using any of this cryptocurrency.

Enjoy Euro 2020, bet, and win crypto!


Binance Futures 50 USDT FREE Voucher: Use this link to register & get 10% off fees and 50 USDT when trading 500 USDT (limited offer).

PrimeXBT Special Offer: Use this link to register & enter POTATO50 code to get 50% free bonus on any deposit up to 1 BTC.

PlatoAi. Web3 Reimagined. Data Inteligence Amplifed.
Click here for Free Trial.


Continue Reading
Blockchain4 days ago

Legends: The premium NFT minting platform

Uncategorized4 days ago

Origin Protocol Price Prediction 2021 – Will OGN Hit $5 Soon?

Assets2 days ago

Hedge fund that shorted GameStop closes as $1.13B GME stock offer completes

Blockchain1 day ago

Active Bitcoin Addresses Reach the Lowest Level in 12 Months

News5 days ago

When is the right time to buy Bitcoin?

Blockchain5 days ago

Indian Police Arrested ”Crypto King” Who Traded Drugs for Bitcoin

Blockchain3 days ago

PayPal and Visa Lead $300M Funding for Blockchain Capital

Blockchain5 days ago

Will Polygon still be necessary after Ethereum 2.0 is live?

Blockchain1 day ago

7 Altcoins That Make You a Billionaire in 2022

News4 days ago

New Bill Aims To Make Paraguay a Global Crypto Hub

News3 days ago

Crypto Trader’s $20 Investment Explodes to $1,184,154,683,482 on Coinbase – But He’s Not Cashing Out

Uncategorized5 days ago

Is $SHIB Better Than $DOGE? And Other Crypto ($BTC, $ETH, $CHZ) News From Paraguay

Blockchain4 days ago

3 Tons of Bitcoin Mining Rigs Will Reportedly Relocate From Guangzhou to Maryland

News5 days ago

Battlegrounds Mobile India sending your data to a Chinese Server: Report

Blockchain2 days ago

Cardano Founder: Ethereum Will Overtake Bitcoin

Blockchain2 days ago

Terra Virtua’s Mechagodzilla NFT sold for $33,700 by Blockmuse

Blockchain5 days ago

Every quad witching, this Chainlink price trend can be observed

Blockchain2 days ago

MATIC, USDT, BAL, WBTC + 3 more cryptocurrencies now available for trading on CoinJar

Blockchain2 days ago

Despite the Bounce: Bitcoin Might Still Retest $24K as Final Leg Down

Blockchain2 days ago

‘Bitcoin’s six-week run of outflows has been driven’ by these factors