Home Search

social engineering - search results

If you're not happy with the results, please do another search
User Verification Policy, zero trust approach

Lack of User Verification Policy for Password Reset Could Lead to Social Engineering Attacks

0
Despite the rise in identity theft across various sectors globally, some organizations are still not maintaining a robust verification process to secure their employee...
PII for social engineering attacks

“Every bit of compromised PII can be used for social engineering attacks to target...

0
Marcus Fowler is Director of Strategic Threat at Darktrace. Before joining Darktrace in 2019, he spent 15 years at the Central Intelligence Agency (CIA)...
Threat Alert! Attackers Use Malicious Email Accounts to Launch BEC Attacks

Five Social Engineering Trends to Watch for 2021

0
Cybercrime continues to be a growing threat and attack methods constantly evolve with each passing day. At the core of almost every successful cyberattack,...
phishing scam, fake CV phishing scam

Social Engineering: Life Blood of Data Exploitation (Phishing)

0
What do Jeffrey Dahmer, Ted Bundy, Wayne Gacy, Dennis Rader, and Frank Abigail all have in common, aside from the obvious fact that they...
blockchain-based social media, Parental Consent for Minors, Iranian Facebook accounts

Blockchain-Based Social Media Will Be More Secure

0
Platforms based on blockchain technology are currently garnering much public interest worldwide since they have always been an entry point for billions of individuals...
blockchain-based social media, Parental Consent for Minors, Iranian Facebook accounts

McAfee Consumer Security Portfolio Integrates Social Media and Tech Scam Protection

0
With the home, school, and the office now becoming a common space for employees, the attack surface broadens to includes consumers and endpoints. Employees...
Improving Cyber Hygiene

Improving Cyber Hygiene with Greater Social Cybersecurity Engagement

0
You don’t have to look too far around to find someone who may not be practicing proper cyber hygiene in order to protect themselves...

EC-Council C|EH Threat Report 2024: A Wake-Up Call for Cybersecurity Professionals 2024

0
The digital landscape is constantly shifting, and with it, the tactics and methods employed by cyber threat actors. Staying informed and ahead of the...
free-online-cybersecurity-courses-certifications

Embark on a Cybersecurity Career with the Top Three Free Online Cybersecurity Courses

0
Free online cybersecurity courses are a great place to start your learning journey if you’re considering a career in this field. Enrolling in a...
Steganography attack

How to Prevent Steganography Attacks

0
Cybercriminals are well-versed in shifting their hacking techniques and adapting new threat strategies to specific situations and opportunities. Threat actors often leverage various tactics...

MOST POPULAR

RECENT POSTS

GITEX ASIA 2025

GITEX Europe 2025

GITEX AFRICA 2025

FUTURE AI SUMMIT MALAYSIA

CYBERX QATAR