Archives - Social Engineering


What is a smishing attack?

Smishing is a form of social engineering that exploits SMS, or text, messages. Text messages can contain links to such things as webpages, email addresses or phone numbers that when clicked may automatically open a browser window or email message or dial a number. This integration of email, voice, text message, and web browser functionality […]

What is a vishing attack?

Vishing is the social engineering approach that leverages voice communication. This technique can be combined with other forms of social engineering that entice a victim to call a certain number and divulge sensitive information. Advanced vishing attacks can take place completely over voice communications by exploiting Voice over Internet Protocol (VoIP) solutions and broadcasting services. […]

What is a social engineering attack?

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he […]

What is a social engineering attack?

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an individual or organization computer system. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he […]

Recognize social engineering schemes in chats and direct messages

Chats and direct messages are essential features of platforms like social networks and online gaming service. Their popularity makes them common conduits for social engineering scams, though. Never click suspicious links or give out sensitive information in these exchanges, especially not to people you’ve just met.

“Je suis Charlie” is also used by cyber criminals!

In our previous blogs we mention that cyber criminals continue using newsworthy cases of social engineering to spread their attacks. Almost every famous event on Earth has been used to perform malicious attacks and scams. The events that cyber criminals like to use most are tragic events such as terrorist attacks. Like “Boston marathon bombing” […]