Announcement
Collapse
No announcement yet.
Search Result
Collapse
15 results in 0.0066 seconds.
Keywords
Members
Tags
-
How-To - Get Someones Birthday details using Social Engineering on Social Media
When a social engineering attack is performed in order to gain personal information from a potential target, many options are available. If just asking...
- Likes 1
-
Social Engineered Click-Jacking Attack
The goal of this kind of attack is to trick unsuspecting users into clicking innocent-looking web pages.
-
System Hacking - Non-Technical Attack
This type of attack is also called a non-electronic attack. A characteristic of this attack is that it does not require any technical knowledge and instead...
-
Social Networking - Information Gathering
Information on both professional and personal networking websites is plentiful. Many people has personal profiles on sites like these and visit them regularly....
-
Social Engineering - Identity Theft
One of the more prominent and rapidly evolving threats is identity theft, which falls under the category of social engineering. According to the Federal...
-
Social Engineering - Social Networking
Some of the biggest security threats have come from the use of social networking. The rapid growth of these technologies let millions of users each day...
-
Social Engineering - Common Targets
An attacker will look for targets of oppotunity or potential victims who have the most to offer. Some common targets include receptionists, help desk...
-
Social Engineering - Impact
Social engineering can have many potential outcomes on an organization, some obvious and some less so. It is important that you understand each of these,...
-
Social Engineering - Phases
Social Engineering consists of multiple phases, each designed to move the attacker one step closer to the end goal.
The social engineering...
-
Social Engineering
Social engineering deals with the targeting and manipulation of human beings rather than technology or other mechanisms. This is popular because the human...
-
The Footprinting Process - Social Engineering
Social engineering is in a way the art of hacking humans. Inside the system and working with it is the human being, which is frequently the easiest component...
-
Calling technical support
Calling technical support is part of a social engineering attack. One purpose is to gather technical information for later use. Some times when it is...
-
Using a Third Person
When an attacker is doing a social engineering attack over the phone a third person can be helpful.
What the attacker will do is call a person...
-
Posing as an Important User
An attacker may attempt a social engineering attack by posing by an important user while on the phone with the victim. The attacker will likely use intimidation...
-
Impersonating an Employee or Valid User
Some attacks work very well if the attacker is impersonating an employee the victim know is real. This will help keeping the victim off-guard. This have...