Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Halloween, Dress Like a Hacker and Terrify Your IT Administrator

This Halloween, Dress Like a Hacker and Terrify Your IT Administrator

Halloween is a time when people of all ages dress up as something spooky that they’re really not. For the scariest of hackers, every day is like a reverse Halloween as they try to scam victims by pretending to be someone safe and trustworthy--a persona that they’re really not. This Halloween, don’t get tricked by the haunted hack!

Tricks of this nature are categorized as social engineering, and unlike a child dressed as a ghoul on Halloween, scams of the social-engineering variety are much more difficult to spot. When it comes to protecting yourself from these targeted scams, it’s imperative that you know what to look for. Also, in the same way you check your kid’s trick-or-treat candy for anything that might be harmful, you need to view unsolicited digital communications with a degree of healthy skepticism.

Unfortunately, social engineering tactics like phishing scams work, which is why hackers increasingly use them. This begs the question; why is it that users so easily fall for these scams, even if they’re aware of the security risks? Researchers from the University of Erlangen-Nuremberg in Germany sought to find this out by studying the reasons why people click on malicious links.

The findings were presented by Zinaida Benenson at the most recent Black Hat convention in Las Vegas. Benenson attributed the “success” of a malicious link to the hacker’s ability to understand the circumstances of the scam, and personalizing the link to appeal to their victim. “By a careful design and timing of the message, it should be possible to make virtually any person to click on a link, as any person will be curious about something, or interested in some topic, or find themselves in a life situation that fits the message content and context."

Translation; even with proactive training and education, the best employee could potentially click on a link if doing so fits into their current interests or piques their curiosity. ZDNet uses the example of a partygoer who attended a recent event and then receives an email containing a link to photos of the party. Naturally, the user will want to click on the link, regardless of where it’s from. In this example, the hacker effectively appeals to the natural curiosity of what might be contained within; when coupled with such personalized context, it’s almost guaranteed that they’ll click it.

Another example would be an employee who’s experiencing technical trouble with a workstation. They’ll then receive an email from “tech support” suggesting they click on a link and download remote access software. If the employee is frustrated and they can’t get their PC to work properly, they will follow the email’s instructions for two reasons: 1) The context fits the situation, and 2) People tend to trust tech support.

Like the work it takes to create an impressive Halloween costume, these hacks rely on a level of preparation and cunning by the hackers. This kind of personalized attention makes social engineering scams particularly challenging to protect oneself against.

Essentially, the possibilities for you and your employees to be tricked by spear phishing attacks and end-user errors are limitless, so long as a hacker knows how to appeal to what a user cares about. At the end of the day, having a staff that knows how to spot a trick, and a network that’s free from scary threats, is the greatest treat a business owner can ask for.

Have a safe and Happy Halloween from all of us at Voyage Technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 09 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Email Workplace Tips Google Privacy Computer Workplace Strategy Backup Small Business Hosted Solutions Collaboration Ransomware Users AI Managed Service Mobile Device Productivity Saving Money Microsoft Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Holiday Facebook Automation Artificial Intelligence Training Compliance Gadgets Covid-19 Cloud Computing IT Support Outsourced IT Remote Work Server Managed Service Provider Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Virtualization Business Technology Bandwidth Blockchain Vendor Managed Services Two-factor Authentication Apps Data Security Mobile Office Gmail Voice over Internet Protocol WiFi Tip of the week Chrome Employer-Employee Relationship Budget Apple Networking App Mobile Device Management BYOD Computing Physical Security Conferencing Information Technology Access Control Office 365 Password HIPAA Managed IT Services Hacker How To Applications BDR Avoiding Downtime Marketing Virtual Private Network Risk Management Healthcare Health Big Data Analytics Office Tips Augmented Reality Retail Storage Bring Your Own Device Router Computers Website 2FA Help Desk Operating System Firewall Display Managed IT Service Remote Workers Printer Telephone The Internet of Things Paperless Office Infrastructure Cooperation Free Resource Social Project Management Windows 7 Document Management Microsoft 365 Solutions Scam Customer Service Data loss Windows 11 Going Green Patch Management Save Money Remote Monitoring Monitoring End of Support Vulnerability Vendor Management Cybercrime Excel Professional Services VPN Saving Time YouTube Meetings Virtual Machines Cryptocurrency Safety Computer Repair Downloads iPhone Virtual Desktop LiFi Licensing Data storage Vulnerabilities Entertainment Data Privacy Outlook Machine Learning Money Images 101 Humor Telephone System Multi-Factor Authentication Mobility Cost Management Customer Relationship Management Maintenance Antivirus Sports Mouse Hacking Employees Presentation Administration Integration User Tip Wireless Technology Modem Mobile Security Processor Robot Holidays Data Storage Settings Wireless Smart Technology Supply Chain Printing Word Video Conferencing Content Filtering IT Management Managed Services Provider Network Congestion Distributed Denial of Service Workplace Gig Economy Public Speaking Screen Reader Lithium-ion battery Service Level Agreement Internet Service Provider Knowledge Computing Infrastructure Teamwork Hiring/Firing Google Drive User Error Regulations Compliance Identity Entrepreneur Evernote Paperless 5G Co-managed IT Bookmark Point of Sale Smart Tech Memes Unified Communications Download Net Neutrality Experience Alerts SQL Server Technology Care Google Docs Bitcoin Network Management Financial Data Undo Running Cable Tech Support History Business Communications Monitors Break Fix Scams Google Wallet Browsers Smartwatch Connectivity IT Upload Procurement Azure Hybrid Work Windows 8 Social Network Telework Laptop Websites Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Drones CES IoT Communitications Trends Supply Chain Management Application Electronic Medical Records SharePoint Customer Resource management FinTech Halloween Regulations Google Calendar Term Google Apps Writing Microsoft Excel IT Maintenance Lenovo Data Analysis IBM Star Wars IT Assessment Gamification Flexibility Virtual Reality Staff Value Business Intelligence Hacks Server Management Organization Scary Stories Private Cloud Social Networking Legislation Shortcuts Identity Theft Smart Devices Fun Ransmoware Superfish Fileless Malware Digital Security Cameras Deep Learning Content Remote Working Twitter Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Competition Error Motherboard Data Breach Education Assessment Electronic Health Records Social Engineering Permissions Workforce Directions Videos Remote Computing Wasting Time Threats Specifications Security Cameras Workplace Strategies Mobile Computing Trend Micro Tablet Internet Exlporer Software as a Service User Search Fraud Meta Microchip Best Practice Username Alert Managing Costs Amazon Dark Data Black Friday SSID Managed IT Buisness File Sharing eCommerce IT solutions Database Surveillance How To Virtual Assistant Outsource IT Legal IP Address Business Growth Notifications IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Proxy Server Reviews Travel Cookies Google Maps Tactics Development Recovery Cortana Hotspot Transportation Small Businesses Techology Alt Codes Hard Drives Mirgation Hypervisor Displays PowerPoint Shopping Domains Downtime Unified Threat Management Nanotechnology Optimization Hosted Solution Addiction Language Employer/Employee Relationships Outsourcing Unified Threat Management Typing Management PCI DSS Refrigeration Chatbots Navigation

Blog Archive