( 2 min read ) This is the final part in our on-going series on social engineering. In this blog, we give you methods to prevent social engineering attacks. According to skilled social engineers, our physical stance ‘leaks’ emotional content, which can indicate deceit and malintent. With voice phishing, you can at least make out gaps and voice modulation that […]
5 Social Engineering Attacks You Should Know
( 3 min read ) This is Part Two of our 3-part series on Social Engineering. In this blog, we discuss 5 social engineering attacks you should be aware of. From our previous blog, we know objectively that SE is the act of tricking a person into doing something against their will. The context behind SE activities can be good or bad. […]
What Is Social Engineering?
( 3 min read ) When it comes to cyber-attacks, our thoughts jump immediately to malicious code and the misuse of technology. However, the success of a cyber-attack relies on other, not-so-famous tricks along with effective security breaching methods. The subtler, more invisible aspect of a cyber-attack is social engineering. We say ‘tricks’ and not ‘techniques’ because that’s exactly what […]