There is a bench in the corridor of the Provincial Cancer Hospital. Lao Zhou lowered his head on it and scrolled through his mobile phone. On the screen of his mobile phone was a WeChat group that claimed to be able to call expert accounts on his behalf.

This is already the seventh time he has rushed to Nanjing to accompany his wife for chemotherapy. Every time he registered, it was like going through a battle until a patient in the same ward recommended this group.

He said there was someone inside who could lock the account source in advance, so I believed him. Lao Zhou's voice was filled with exhaustion and self-blame. The other party proposed to transfer 800 yuan first as a "handling fee." After the money was transferred, the WeChat avatar never lit up again.

Be wary of the “psychological traps” around you

Lao Zhou's experience is not an isolated case.

Now living in cities, people have long been accustomed to the convenience of doing things online. Because of this habit, it has given those with ulterior motives an opportunity to take advantage of it.

Just last week, Aunt Li, who lives in the community next door, met two young people wearing volunteer red vests at the door of the neighborhood committee. They said they were going to get the "senior subsidy online certification" for the elderly.

Aunt Li looked at their skillful operations and did not look carefully at the mobile phone handed over by the other party. Then she cooperated to complete the blinking action, and then completed the facial recognition of nodding.

It wasn't until two days later that she discovered that 2,000 yuan was missing from her Alipay.

This method of using trust to implement deception is actually a typical social engineering attack. It has nothing to do with the level of technology, but only involves people's hearts.

Information security, don’t just focus on the firewall

There is still a situation where many people still believe that as long as they install anti-virus software and set complex passwords, they are safe. However, the actual situation is not like this.

Social engineering attacks target precisely the instinctive reactions we have in our daily lives.

For example, when we are picking up express delivery from the community Cainiao Station, someone pretends to be a courier and calls claiming that the package is damaged and requires verification of identity. Many people will become panicked because they are worried about not receiving the items they belong to, and hand over their personal information according to the other party's words.

This routine of using curiosity and instinctive reactions is performed every day in the corners of the city.

In online life, you might as well take it slow

In social networking, this type of trap is more subtle.

Many young people are keen to share their personal life situations on social platforms, but they are completely unaware that the information shared has become an "intelligence library" for attackers.

Exploiting human weaknesses for deception_Preventing social engineering attacks_How should we defend against social engineering attacks in our daily life and work?

Xiao Liuyu works in an Internet company in Nanjing. Just because he posted his work badge and the company's internal system interface on his friends circle, he received a system upgrade email from the "IT department" the next day.

The page displayed, and the email link corresponded to the company's internal system. After he entered the account and password, the company's core data was almost leaked.

Such a precise strike that relies on people's trust in the working environment and the habitual operations they follow makes it difficult for people to guard against it. They are always under attack and have no way to defend themselves. It is really impossible to guard against it!

"The Test of Human Relationships" in the Fireworks of the Market

In wet markets and street shops, social engineering attacks are often disguised as human kindness.

Last week, a familiar face "borrowed" 500 yuan from Lao Chen, a stall owner who has been selling vegetables in Kexiang for 20 years.

There is a guy who comes over every once in a while to buy vegetables, and every time he chats with people about trivial matters at home, and emphasizes to himself that he is a purchasing staff member of the logistics company next door.

That day he said he had little money on hand and would pay it back the next day.

As a result, this person never appeared again.

Lao Chen only reacted belatedly after the incident happened. The other party had already figured out his daily collection pattern and his soft-hearted personality through previous chats.

Precaution is the best firewall

To guard against these attacks, the first thing is to recognize the weaknesses in human nature, such as greed, selfishness, curiosity, and trust. These are neither good nor bad, but when exploited, they can cause damage.

For example, the "scan the code to give away eggs" activity that appears from time to time in the community takes advantage of people's small degree of greed; but for those so-called "shock-breaking" phishing links on the Internet, it takes advantage of curiosity.

The prevention that really works is not to close oneself in an isolated area of ​​​​information, but to be more cautious in the subtle details of daily life.

In the event of an emergency, don’t rush to make a decision immediately. Check with your family, neighbors or relevant institutions; when it comes to transfers, facial recognition, and password input, be sure to confirm whether the other party’s identity is authentic and reliable.

In Nanjing, a city full of life, white-collar workers who appear to be in a hurry at Xinjiekou, or citizens who take a leisurely walk next to the Confucius Temple are all facing these invisible challenges while enjoying the convenience of the digital age.

What we need is not to panic, but to build a psychological defense line that belongs to daily life. Through vigilance and wisdom, we can protect our own stability and peace.