Social Engineering

social engineering

Social Engineering

Social engineering attacks have many different tactics and can be initiated by a number of means targeting humans. Social engineering techniques vary, however, we will discuss the five most common forms of social engineering attacks.  1.What is a Social Engineering Attack? A Social Engineering Attack is a method of obtaining confidential [...]

Read more...
A Phishing Simulation

Keep Your Institution Safe with A Phishing Simulation Software!

1- What is A Phishing Simulation? A Phishing simulation is a solution that trains individuals against cyber attacks that may come through email and helps individuals to be one step ahead of attacks. The simulation literally means “imitation, similar”,  which models a theoretical or physical system in a computer environment and [...]

Read more...
Telephone social engineering

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 10, TELEPHONE SOCIAL ENGINEERING

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 10, TELEPHONE SOCIAL ENGINEERING In Episode 10, a young finance executive is denied a job after his employer tells him that his credit rating is horrible.  He comes to find out that this was due to an identity theft issue originated by [...]

Read more...
Email Security

Emails are Still the Weakest Link in Security Chain

According to F-Secure, over one-third of all security incidents start with phishing emails or malicious attachments sent to company employees. Emails are still the weakest link in security chain.  An email has shifted to an essential part of daily life that many businesses rely on email services now as a central [...]

Read more...