Archives - Spear Phishing


Your boss just emailed you… or did they? the threat of spear phishing

You get an email that looks completely legitimate. The sender is your boss, a coworker, or maybe even someone from your IT department. The message is well-written and refers to a project you’re working on, asking you to quickly click a link to review a document or log in to a new platform. Your gut […]

Be aware of social engineering attacks

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an individual or organization computer system. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he […]

Don’t accept friend requests from people you don’t know

Bad actors looking for personal information might be trying to access your friends-only posts for nefarious purposes. Only accept friend requests from people you know.

All about spear-phishing emails

It seems there’s no shortage of cybersecurity threats that cautious individuals need to guard against. Phishing is on the most common methods that criminals use for breaching accounts, stealing credentials and compromising data, and there’s no shortage of variations on this technique, including SMS (short message service) phishing, or smishing, and spear-phishing, a kind of […]

What is social engineering?

Cybercriminals perform social engineering techniques such as phishing, baiting and spear phishing to manipulate their targets into disclosing personal information. Social engineering relies on human interaction to get access to the confidential information they need to commit cybercrimes. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or […]

What is a social engineering attack?

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he […]