Skip to content

What is ‘shoulder surfing’ and how to avoid being a victim of this cyber attack

With the passage of time and the development of technology, the types of cyber attacks have multiplied and have also been perfected, with ‘phishing’ and ‘smishing’ being two of the most widely used techniques today, although they have not been lost other more traditional ones, such as ‘shoulder surfing’.

YOU CAN SEE: Facebook turns 18: a new threat to users emerges in Messenger

Despite the fact that the methods are increasingly sophisticated, since cybercriminals manage to impersonate legitimate sources in many cases, it is still a rudimentary technique that does not require technology to be carried out.

It is about ‘shoulder surfing’, which consists of looking over the shoulder at the victim who is using a mobile phone, a computer or a tablet, to obtain confidential information, such as the PIN number or the access code to a banking application .

YOU CAN SEE: The 5 methods of password theft most used by cybercriminals and how to prevent them

It is such a simple method that many users trust that they will not fall into this trap and do not exercise extreme caution when using these devices. However, cybercriminals have developed various procedures to steal personal data and commit crimes of all kinds.

With ‘shoulder surfing’, cyber fraudsters can change logins with the aim of extorting the user to recover the account later, collect information in order to impersonate identity, access and divert funds from bank accounts or trolling and bullying by posting inappropriate content from the stolen accounts.

YOU CAN SEE: Cybercrime in 2022: how have digital threats evolved and how can we protect ourselves?

Although it seems like an easy crime to avoid, this is still a method chosen by many cybercriminals, although it is possible to strengthen the protection of personal information by carrying out a series of measures.

From the computer cybersecurity company ESET they recommend never reusing passwords in all accounts, as well as using a credential manager to store them.

It is also convenient to activate multi-factor authentication (MFA), an access management tool that is used to access certain accounts, websites or applications using at least two different verification factors. For example, a PIN code and facial recognition.

Another of the most effective resources is the use of a privacy screen on laptops. They are thin plastic pieces that are placed on the monitor or laptop screen to avoid looks for fraudulent purposes.

On the other hand, it is convenient to deactivate the on-screen notifications of messages, emails and alerts, as well as to reinforce the access codes and passwords for unlocking equipment, tablets and smartphones.

Finally, ESET mentions a resource as simple as always being alert when users connect to their accounts in public places, such as trains, airports or planes. In these cases, it should preferably be done with your back to the wall to avoid ‘shoulder surfing’.

Many people underestimate shoulder surfing because it doesn’t require technology to run, but cybercriminals continue to use it for their misdeeds. (Photo: Eset)

  • Facebook turns 18: a new threat to users emerges in Messenger
  • The 5 methods of password theft most used by cybercriminals and how to prevent them
  • Cybercrime in 2022: how have digital threats evolved and how can we protect ourselves?
  • Dark Souls III: vulnerability exposes online players to cyber attacks that can damage the PC
  • Woman receives a call from a fake bank worker and suffers the theft of S / 7,800 that were spent in a bookmaker

Source: Elcomercio

Share this article:
globalhappenings news.jpg
most popular