Businesses should conduct regular network assessments to ensure that their IT processes are performing efficiently. From identifying obsolete hardware and software to improving security and devising disaster plans, a well-designed…
social engineering
-
-
Baiting is a form of social engineering that relies on the greed or curiosity of the victim. It’s similar to phishing attacks in many ways. However, what makes it different…
-
What is Tailgating? Tailgating is a social engineering attack. In simple words, tailgating is when an unauthorised person gets access to a restricted area by following an authorised person. People…
-
A social engineering assessment is a very important process to understand an organisation’s security exposure. As human beings tend to make errors and are considered the weakest link in any…
-
Identity theft is when someone impersonates you by using your name, ID, password, and other personal data, illegally. It is commonly done to gain money. Hackers get hold of your…
-
Vishing is a term derived from ‘voice’ and ‘phishing’. It is a type of social engineering attack carried out through a telephone. The attacker intends to phish out information from…
-
We all know about cyber criminals who leverage their technical knowledge for malicious purposes and infiltrate into protected systems to extract sensitive information. These type of attackers remain in the…
-
In information security, social engineering is a technique used to manipulate people into revealing private information. It is mostly done online rather than by breaking in or using other hacking…