Archives - Spear Phishing


Don’t let “pig butchering” scams fatten you up for the steal

You’re scrolling through a dating app or maybe just checking your social media, and an attractive, friendly-sounding stranger connects with you. They seem genuine, interesting, and maybe even a little romantic. Over weeks, maybe even months, you build a relationship of trust. You feel safe, understood, and a little excited. Then comes the “opportunity.” This […]

Your boss just emailed you… or did they? the threat of spear phishing

You get an email that looks completely legitimate. The sender is your boss, a coworker, or maybe even someone from your IT department. The message is well-written and refers to a project you’re working on, asking you to quickly click a link to review a document or log in to a new platform. Your gut […]

Be aware of social engineering attacks

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an individual or organization computer system. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he […]

Don’t accept friend requests from people you don’t know

Bad actors looking for personal information might be trying to access your friends-only posts for nefarious purposes. Only accept friend requests from people you know.

All about spear-phishing emails

It seems there’s no shortage of cybersecurity threats that cautious individuals need to guard against. Phishing is on the most common methods that criminals use for breaching accounts, stealing credentials and compromising data, and there’s no shortage of variations on this technique, including SMS (short message service) phishing, or smishing, and spear-phishing, a kind of […]

What is social engineering?

Cybercriminals perform social engineering techniques such as phishing, baiting and spear phishing to manipulate their targets into disclosing personal information. Social engineering relies on human interaction to get access to the confidential information they need to commit cybercrimes. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or […]