Cart 0

 

59A23FBB-28A5-4376-B461-AD7B044D2393.jpg

Knowledge Center

 

 
social-engineering-tactics.jpg

Social Engineering Attack’s?

Social Engineering Attack’s?: You might’ve received phone calls or emails from people giving credit card offers. They try to take their targets into confidence and make them pay a hefty amount to claim the deals offers. this is called fraud. That’s an example/type of social engineering, where people try confidence tricks on their targets.

This social manipulation is not just for financial benefits. Social engineering can be done for other purposes too, for instance, harvesting information from people. It involves playing with their mind to accomplish their goals.

ShoulderSurfing.jpg

Shoulder Surfing

Shoulder Surfing: the practice of spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information.

WhalingAttack.jpg

Whaling Attack

Whaling Attack: also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company, as those that hold higher positions within the company typically have complete access.

WateringHoleAttack.jpg

Watering Hole Attack

Watering Hole Attack: is a method in which the attacker seeks to compromise a specific group of end users by infecting websites that members of that group are known to visit.

Smishing.jpg

Smishing

Smishing:, or SMS phishing, sends a text message to an individual's mobile phone in an attempt to get them to divulge personal information.
Baiting: Attackers leave infected USB drives or optical disks at public places with a hope of someone picking it up out of curiosity and using it on their devices.

 
womenwalkingintowork.jpg

Tailgating

Tailgating : is one of the most common and innocent security breaches – an employee opening a door and holding it open for others, visitors without badges, or the passive acceptance of a uniformed worker.

tailgating.png

Piggybacking

Piggybacking : was revealed as one of the top methods that was used in order to enter off-limits areas.

DumpsterDiving.jpg

Dumpster Diving

Dumpster Diving: search through dumpsters or similar trash receptacles for PII and items of value."

SpearPhishing2.jpg

Spear Phishing

Spear Phishing: is an email or electronic communications scam targeted towards a specific individual, organization or business. Although often intended to steal data for malicious purposes.

Vishing.jpg

Vishing

Vishing: is when scammers contact you over the phone to extract personal information or trick you into giving access to your computer or accounts.

Pretexting.jpg

Pretexting

Pretexting: an attack used to extract PII or some other information. An attacker might impersonate another person or a known figure. Another example of pretexting can be fake emails you receive from your device.

 
 
 

 
logo.png