How white hat hackers do bad things for good reasons

Some companies are lovestruck with social engineering to monitor their employees

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

Imagine you are the receptionist at the front desk of a bank around Valentine’s Day. There are countless bouquets of flowers and boxes of chocolate being dropped off for delivery to employees. You set them aside and alert the employee upon arrival.

But what about that one box with no name on it that says “To my love.” Taped to the box is a DVD. The delivery person says he doesn’t know who it is for; he tells the receptionist that he simply delivers the packages. The receptionist wants the romantic package to make it to the intended target, so she puts the DVD into her computer in hopes it can give her a clue.

A video animation pops up on her screen of a bunny saying, “I love you.” However, behind the scenes, an executable is placed on the computer. And now the criminal is inside the company’s network.

To continue reading this article register now