||Oracle Tips by Burleson
Chapter 8 -
Social Engineering Techniques for Identity
If the company responsible for the survey is
actually legitimate, they will most likely keep personal information
safe and secure. It is still possible, however, for those forms to
be lost, stolen or copied. Whoever obtains them has the power to
cause many people a lot of headaches.
Another way criminals use social engineering to
gather information about an individual is through casual
conversation. What about that seemingly nice person in the coffee
shop that was so friendly and interested in the job of the person
casually sitting next to them? They may have just been a friendly
person; however, they may have been learning about that individual
in order to get one step closer to stealing their identity.
Phony ATMs and Identity Theft
WIXOM, MI -- U.S. Secret Service agents and
Wixom police have arrested a man accused of stealing more than $3.5
million by installing ATM machines across the country and stealing
customers' account numbers (The Detroit News, December 5,
The criminal in the news story actually
purchased ATM machines and set them up as if they were legitimate
ATMs. He then used card numbers and PIN codes of unsuspecting ATM
users to steal from their bank accounts. Although the specifics are
not mentioned in this news item, it is not a unique story.
Sometimes, as in this case, the entire machine is a fake.
Other times, criminals will attach a duplicate
card reader to the front of the machine along with a small digital
video camera, which allows them to witness a user entering their
PIN, all from the comfort of the criminal’s laptop that can be up to
200 meters away.
Download your Oracle scripts now:
definitive Oracle Script collection for every Oracle professional DBA