Social engineering for lawyers

Social networking social engineering methods
- "Did you see this video of you? Click here to see it."
- "Why did you send this to me?"
- "Wow, is this really you in this photo?"
Each of these phrases will have a link and if the recipient clicks on this link, his computer can become infected with malware as well. Then it will be used to send links to other users and the process continues.
Tech support social engineering methods
Phishing social engineering methods
Other sites spoof social networking sites such as Facebook and Twitter in order to trick users to inputting their login information which is recorded and stolen.
In the law firm, there is a huge amount of sensitive information. Beware of any messages, posts, comments, emails or web sites that seem even the least bit suspicious.
- What is Social Engineering? (webroot.com)
- Hacking the Mind [Infographic] (thetechscoop.net)
- A look at social engineering (glennswritinginterest.wordpress.com)
- The concise 2013 list of social engineering scams (concise-courses.com)
- Cybergangs embracing crimeware over social engineering (net-security.org)
- What is Phishing? (webroot.com)
- Hacking the Mind: How & Why Social Engineering Works (veracode.com)
- The Secret To Chinese Hackers Success (social-engineer.org)
- Labor Day Phishing Scams - Don't Get Hooked This Year | Webroot Software (webroot.com)
- LinkedIn Endorsements are Social Engineering (securosis.com)