Would you trust....

not sure Colin, but if you give me your bank details I will let you know. ;-)
 
There are some scamming people about Colin
What I found curious was that this particular "hacker" seems to have the same name as you :thinking:
Curios verrrrrrrrrrrrry curious :D

Just goes to show how bloody easy it is if you have the balls :thumbs:
 
Interesting stuff :thumbs: so....second body D3 next month Colin? :p
 
This was from a few years ago

Social Engineering Fundamentals, Part I: Hacker Tactics
by Sarah Granger
last updated December 18, 2001

One morning a few years back, a group of strangers walked into a large shipping firm and walked out with access to the firm’s entire corporate network. How did they do it? By obtaining small amounts of access, bit by bit, from a number of different employees in that firm. First, they did research about the company for two days before even attempting to set foot on the premises. For example, they learned key employees’ names by calling HR. Next, they pretended to lose their key to the front door, and a man let them in. Then they "lost" their identity badges when entering the third floor secured area, smiled, and a friendly employee opened the door for them.

The strangers knew the CFO was out of town, so they were able to enter his office and obtain financial data off his unlocked computer. They dug through the corporate trash, finding all kinds of useful documents. They asked a janitor for a garbage pail in which to place their contents and carried all of this data out of the building in their hands. The strangers had studied the CFO's voice, so they were able to phone, pretending to be the CFO, in a rush, desperately in need of his network password. From there, they used regular technical hacking tools to gain super-user access into the system.

In this case, the strangers were network consultants performing a security audit for the CFO without any other employees' knowledge. They were never given any privileged information from the CFO but were able to obtain all the access they wanted through social engineering. (This story was recounted by Kapil Raina, currently a security expert at Verisign and co-author of mCommerce Security: A Beginner's Guide, based on an actual workplace experience with a previous employer.)

http://www.securityfocus.com/infocus/1527

It is now 2009 and people still fall for the tricks
 
:clap::clap::clap::clap: Nice one Colin, we know someone who does the same thing and helps a hell of a lot of businesses :thumbs:
 
Colin can you just remind me what the password to your paypal account was ;)

Working in an open plan office its fun to watch everyone watch someone come in, that no one knows. They probably all think I wonder who that is, but no one asks ... It's almost always one of my team from IT that stops the person and asks who they are.
 
I can vouch for the fact that once past the " Rottweiler" on reception
( or even sometimes the pussy cat) then rarely do I get "questioned"

in the coarse of my work I access all area's in some very large companies
and that includes private schools & nurseries
Ok so in some of the smaller places that I work "everybody" knows me but in the larger ones.............
 
Back
Top