Archives - Social Engineering


What is a social engineering attack?

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he […]

What is a social engineering attack?

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an individual or organization computer system. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he […]

Recognize social engineering schemes in chats and direct messages

Chats and direct messages are essential features of platforms like social networks and online gaming service. Their popularity makes them common conduits for social engineering scams, though. Never click suspicious links or give out sensitive information in these exchanges, especially not to people you’ve just met.

“Je suis Charlie” is also used by cyber criminals!

In our previous blogs we mention that cyber criminals continue using newsworthy cases of social engineering to spread their attacks. Almost every famous event on Earth has been used to perform malicious attacks and scams. The events that cyber criminals like to use most are tragic events such as terrorist attacks. Like “Boston marathon bombing” […]

Tax refund spams are back

It’s that time of the year when people in some parts of the world are filing their tax returns, and what better time for cyber crooks to trick them into falling prey for phishing attacks via emails. India has been reported in recent malware threat reports as one of the regions with high spam activity […]

Android Social Engineering Threats in the Spotlight

In all of our earlier blogs about the Android threats, we have highlighted the fact that user awareness is one of the most important factors to fight against the social engineering threats. Yesterday, a familiar Android threat was making news powered by a sound social engineering trick.  This blog looks at the differences/similarities of the […]