Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Halloween, Dress Like a Hacker and Terrify Your IT Administrator

This Halloween, Dress Like a Hacker and Terrify Your IT Administrator

Halloween is a time when people of all ages dress up as something spooky that they’re really not. For the scariest of hackers, every day is like a reverse Halloween as they try to scam victims by pretending to be someone safe and trustworthy--a persona that they’re really not. This Halloween, don’t get tricked by the haunted hack!

Tricks of this nature are categorized as social engineering, and unlike a child dressed as a ghoul on Halloween, scams of the social-engineering variety are much more difficult to spot. When it comes to protecting yourself from these targeted scams, it’s imperative that you know what to look for. Also, in the same way you check your kid’s trick-or-treat candy for anything that might be harmful, you need to view unsolicited digital communications with a degree of healthy skepticism.

Unfortunately, social engineering tactics like phishing scams work, which is why hackers increasingly use them. This begs the question; why is it that users so easily fall for these scams, even if they’re aware of the security risks? Researchers from the University of Erlangen-Nuremberg in Germany sought to find this out by studying the reasons why people click on malicious links.

The findings were presented by Zinaida Benenson at the most recent Black Hat convention in Las Vegas. Benenson attributed the “success” of a malicious link to the hacker’s ability to understand the circumstances of the scam, and personalizing the link to appeal to their victim. “By a careful design and timing of the message, it should be possible to make virtually any person to click on a link, as any person will be curious about something, or interested in some topic, or find themselves in a life situation that fits the message content and context."

Translation; even with proactive training and education, the best employee could potentially click on a link if doing so fits into their current interests or piques their curiosity. ZDNet uses the example of a partygoer who attended a recent event and then receives an email containing a link to photos of the party. Naturally, the user will want to click on the link, regardless of where it’s from. In this example, the hacker effectively appeals to the natural curiosity of what might be contained within; when coupled with such personalized context, it’s almost guaranteed that they’ll click it.

Another example would be an employee who’s experiencing technical trouble with a workstation. They’ll then receive an email from “tech support” suggesting they click on a link and download remote access software. If the employee is frustrated and they can’t get their PC to work properly, they will follow the email’s instructions for two reasons: 1) The context fits the situation, and 2) People tend to trust tech support.

Like the work it takes to create an impressive Halloween costume, these hacks rely on a level of preparation and cunning by the hackers. This kind of personalized attention makes social engineering scams particularly challenging to protect oneself against.

Essentially, the possibilities for you and your employees to be tricked by spear phishing attacks and end-user errors are limitless, so long as a hacker knows how to appeal to what a user cares about. At the end of the day, having a staff that knows how to spot a trick, and a network that’s free from scary threats, is the greatest treat a business owner can ask for.

Have a safe and Happy Halloween from all of us at Voyage Technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Computer Google Email Workplace Tips Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Android AI Data Recovery Upgrade Disaster Recovery Smartphones Business Management VoIP Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Information Miscellaneous Holiday Gadgets Training Cloud Computing Covid-19 Server Compliance Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Wi-Fi Windows 10 Bandwidth Blockchain Virtualization Apps Two-factor Authentication Mobile Office Data Security Vendor App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome Gmail Budget WiFi BYOD Apple Access Control Computing Hacker Conferencing Information Technology Avoiding Downtime Marketing Office 365 How To BDR HIPAA Applications Health 2FA Help Desk Operating System Computers Risk Management Retail Healthcare Website Managed IT Services Analytics Office Tips Augmented Reality Storage Password Bring Your Own Device Router Big Data Virtual Private Network Printer Paperless Office Windows 11 Going Green Infrastructure Monitoring Customer Service Excel Cybercrime Document Management Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Firewall Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions The Internet of Things Physical Security Social Display Processor Computer Repair Mobile Security Holidays Customer Relationship Management Settings Data Storage Wireless Smart Technology Supply Chain Printing Content Filtering Video Conferencing Machine Learning Managed Services Provider Hacking YouTube Saving Time Virtual Machines Professional Services Presentation Cryptocurrency Managed IT Service Wireless Technology Maintenance Downloads Antivirus Virtual Desktop iPhone Data storage LiFi Licensing Word Entertainment Vulnerabilities Outlook Data Privacy Images 101 Money Humor Multi-Factor Authentication Robot Mobility Telephone System Cost Management Safety Sports Mouse IT Management Meetings VPN Employees Administration Integration User Tip Modem IBM Legal IT solutions Database Surveillance Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Media Business Growth Network Management Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Cortana Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Alt Codes Downtime Shopping Nanotechnology Optimization PowerPoint Competition Hosted Solution SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Navigation Typing Management PCI DSS Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Google Drive User Knowledge Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Evernote Paperless Server Management Regulations Compliance Superfish Bookmark 5G Identity Theft Smart Tech Memes Co-managed IT IP Address Google Docs Unified Communications Experience Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History Business Communications Bitcoin Running Cable Financial Data Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Google Wallet Recovery Upload Procurement Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Hard Drives Windows 8 Laptop Social Network Telework CES Tablet IoT Communitications Dark Web Cables Domains Drones Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Refrigeration Halloween Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Public Speaking Lithium-ion battery Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Hacks Entrepreneur Scary Stories Organization Techology Fileless Malware Digital Security Cameras Fun Google Maps Smart Devices Ransmoware Deep Learning Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Undo Health IT Education Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Mobile Computing User Error Microchip Search Internet Exlporer Software as a Service Fraud Meta Application Best Practice Username Managing Costs Amazon Buisness Point of Sale eCommerce Black Friday SSID

Blog Archive