{"id":5257,"date":"2021-08-18T10:29:44","date_gmt":"2021-08-18T10:29:44","guid":{"rendered":"https:\/\/flymediatech.com.au\/?p=5257"},"modified":"2021-08-18T10:29:44","modified_gmt":"2021-08-18T10:29:44","slug":"importance-of-google-safe-browsing-in-the-context-of-social-engineering","status":"publish","type":"post","link":"https:\/\/flymediatech.com\/australia\/importance-of-google-safe-browsing-in-the-context-of-social-engineering\/","title":{"rendered":"What is the importance of google safe browsing in the context of social engineering?"},"content":{"rendered":"<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">By social engineering, we indicate the kind of content that contrives the visitors to do something minacious (dangerous). According to the experts practicing in the famous <\/span><\/span><a href=\"https:\/\/flymediatech.com.au\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\"><b>digital marketing company<\/b><\/span><\/span><\/a><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">, \u201cThe menacing attacks may result in the following:<\/span><\/span><\/p>\n<ul>\n<li>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">Exposing Confidential information<\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">Downloading some kind of threatening software\u201d<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">In case, your website is found to be having some kind of deceptive content (social engineering content), then the chrome browser shows the following warning:<\/span><\/span><\/p>\n<p align=\"center\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: x-large;\"><b>Deceptive Site Ahead<\/b><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">Various <\/span><\/span><a href=\"https:\/\/flymediatech.com.au\/social-media-marketing\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\"><b>social media marketing<\/b><\/span><\/span><\/a><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\"> companies visit security issues reports, in case they are doubting that the particular content may come out as treacherous or the one which satisfies all the credentials of becoming social engineering content.<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: x-large;\"><b>Social Engineering<\/b><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">To mislead the visitors to do something menacing or vicious is known as social engineering:<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: x-large;\"><b>Social Engineering Attacks<\/b><\/span><\/span><\/p>\n<table width=\"624\" cellspacing=\"0\" cellpadding=\"7\">\n<tbody>\n<tr valign=\"top\">\n<td style=\"background: transparent;\" width=\"297\">\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\"><b>Phishing<\/b><\/span><\/span><\/p>\n<\/td>\n<td style=\"background: transparent;\" width=\"297\">\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">This artifice somehow convinces the user to reveal the personal information by falsely making them believe that they are from some bank or some government organization. The information may comprise of the following:<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">Passwords<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">Phone Numbers<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">Credit Cards<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"background: transparent;\" width=\"297\">\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\"><b>Deceptive Content<\/b><\/span><\/span><\/p>\n<\/td>\n<td style=\"background: transparent;\" width=\"297\">\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">This trick allows the visitor to provide information by appearing as some kind of trusted entity.<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\"><b>Example of the deceptive content<\/b><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">Sometimes, it happens that one kind of warning keeps on getting shown on the browser which may be like:<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\"><i><u><b>Your software is out of date, Install XYZ to optimize the system performance <\/b><\/u><\/i><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"background: transparent;\" width=\"297\">\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\"><b>The Appearance Of The Third Party Content<\/b><\/span><\/span><\/p>\n<\/td>\n<td style=\"background: transparent;\" width=\"297\">\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">In many of the cases, it happens that the particular treacherous person is making a fool of you by extracting the required information and the money by emerging as the one who is operating on the behalf of someone.<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: x-large;\"><b>FAQ\u2019s<\/b><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\"><b>How can we protect ourselves from being tricked by social engineering practices?<\/b><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">Google safe browsing is accountable for protecting web users. It appears successful in this motive by warning the users not to visit this particular site or page.<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\"><b>When are web pages considered included in social engineering?<\/b><\/span><\/span><\/p>\n<ul>\n<li>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">When they are only pretending to be a trusted entity.<\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">When they are leading you to do something which you could only do if some trusted entity will trigger you to do so.<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\"><b>What is social engineering embedded content?<\/b><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">Social engineering is accountable for showing up the content that is embedded in some kind of benign website. If any content is found to be embedded in the social engineering content then it comes under the policy violation for the host page.<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">The violation of the safe browsing rules will still be found if a user experiences any of the following:<\/span><\/span><\/p>\n<ul>\n<li>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">Pop-Ups<\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">Pop-Unders<\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">Redirections<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\"><b>What should you do?<\/b><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">First of all, you should not post any content unless you are doubly sure that it does not contain any treacherous content or one which may or may not mislead the people. As discussed, you can get it checked on the security issues report.<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"font-family: Roboto, serif;\"><span style=\"font-size: medium;\">Hiring a good digital marketing company is to save you from the risk of spoiling your reputation by emerging as the violator of the safe browsing regulations.<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By social engineering, we indicate the kind of content that contrives the visitors to do something minacious (dangerous). According to the experts practicing in the famous digital marketing company, \u201cThe menacing attacks may result in the following: Exposing Confidential information Downloading some kind of threatening software\u201d In case, your website is found to be having [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5258,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-5257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-marketing"],"_links":{"self":[{"href":"https:\/\/flymediatech.com\/australia\/wp-json\/wp\/v2\/posts\/5257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/flymediatech.com\/australia\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/flymediatech.com\/australia\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/flymediatech.com\/australia\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/flymediatech.com\/australia\/wp-json\/wp\/v2\/comments?post=5257"}],"version-history":[{"count":0,"href":"https:\/\/flymediatech.com\/australia\/wp-json\/wp\/v2\/posts\/5257\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/flymediatech.com\/australia\/wp-json\/wp\/v2\/media\/5258"}],"wp:attachment":[{"href":"https:\/\/flymediatech.com\/australia\/wp-json\/wp\/v2\/media?parent=5257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/flymediatech.com\/australia\/wp-json\/wp\/v2\/categories?post=5257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/flymediatech.com\/australia\/wp-json\/wp\/v2\/tags?post=5257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}