Home Search
social engineering - search results
If you're not happy with the results, please do another search
Lack of User Verification Policy for Password Reset Could Lead to Social Engineering Attacks
Despite the rise in identity theft across various sectors globally, some organizations are still not maintaining a robust verification process to secure their employee...
“Every bit of compromised PII can be used for social engineering attacks to target...
Marcus Fowler is Director of Strategic Threat at Darktrace. Before joining Darktrace in 2019, he spent 15 years at the Central Intelligence Agency (CIA)...
Five Social Engineering Trends to Watch for 2021
Cybercrime continues to be a growing threat and attack methods constantly evolve with each passing day. At the core of almost every successful cyberattack,...
Social Engineering: Life Blood of Data Exploitation (Phishing)
What do Jeffrey Dahmer, Ted Bundy, Wayne Gacy, Dennis Rader, and Frank Abigail all have in common, aside from the obvious fact that they...
Blockchain-Based Social Media Will Be More Secure
Platforms based on blockchain technology are currently garnering much public interest worldwide since they have always been an entry point for billions of individuals...
McAfee Consumer Security Portfolio Integrates Social Media and Tech Scam Protection
With the home, school, and the office now becoming a common space for employees, the attack surface broadens to includes consumers and endpoints. Employees...
Improving Cyber Hygiene with Greater Social Cybersecurity Engagement
You don’t have to look too far around to find someone who may not be practicing proper cyber hygiene in order to protect themselves...
EC-Council C|EH Threat Report 2024: A Wake-Up Call for Cybersecurity Professionals 2024
The digital landscape is constantly shifting, and with it, the tactics and methods employed by cyber threat actors. Staying informed and ahead of the...
Embark on a Cybersecurity Career with the Top Three Free Online Cybersecurity Courses
Free online cybersecurity courses are a great place to start your learning journey if you’re considering a career in this field. Enrolling in a...
How to Prevent Steganography Attacks
Cybercriminals are well-versed in shifting their hacking techniques and adapting new threat strategies to specific situations and opportunities. Threat actors often leverage various tactics...