Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented. Solution Answer: As per Computer Weekly, social engineering attacks were the most well-known hacking strategy utilized as a part of 2015. What\'s more, there\'s no indication of it backing off; in 2016 60 percent of undertakings were casualties of a social engineering attack or something to that affect. Furthermore, as per EMC, phishing attacks—the least demanding and most normal sort of social engineering attacks—brought about almost $6 billion in misfortunes in 2013 alone, spread out finished around 450,000 separate bargains. Some hurt more regrettable than others, however all brought about a sufficiently genuine shake up for security directors to recalibrate their regard for the vector, investigate their conventions, and make teaching staff a best need. Here\'s our pick for five of the greatest social engineering attacks ever. 5. 2011 RSA SecurID Phishing Attack Security firms ought to be the most secure targets with regards to a data framework attack, yet they are likewise delicious focuses on that draw more than what\'s coming to them of endeavors. In 2011, one of these attacks bit encryption mammoth RSA and prevailing with regards to mesh hackers profitable data about the organization\'s SecurID two-factor validation coxcombs. In spite of the fact that RSA at first denied that the data could enable hackers to trade off anybody utilizing SecurID, protection temporary worker Lockheed Martin soon recognized hackers endeavoring to rupture their system utilizing stolen SecurID information. RSA retreated rapidly and consented to supplant a large portion of the disseminated security tokens. This inconvenience came down to four workers at RSA parent organization EMC. Attackers sent them email with a satirize deliver implying to be at a vocation enrollment site, with an Excel connection titled 2011 Recruitment Plan. It wasn\'t clear why the representatives would think about a spreadsheet from an outsider site, however they opened it—and a zero-day Flash adventure covered in the spreadsheet introduced indirect access to their work machines that soon exposed the keys to the kingdom. 4. 2015 Ubiquiti Networks Scam Not all hackers are searching for touchy data; here and there they simply need chilly, hard money. In 2015, Ubiquiti, a particular producer of wifi hardware and software situated in San Jose, discovered this out the most difficult way possible when their fund division was focused in an extortion conspire rotating around worker pantomime. The organization never uncovered precisely how the attack was organized, yet said that the bookkeeping office got email indicating to be from the organization\'s Hong Kong auxiliary. Regularly, such emails contain guidelines with respect to changes in installment account points of interest or new selle.