Quantcast
Channel: Social Engineering – Cyphere
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Purple team: Bridge between Red Teams and Blue Teams

Although offensive and defensive controls work towards the same goal, how do you ensure red and blue teamwork follows a collaborative approach? The answer is this article – purple teaming for dummies....

View Article


Image may be NSFW.
Clik here to view.

How to spot and report phishing emails in UK?

According to DBIR verizon report, in 2020, 22% of the data breaches involved phishing attacks. Phishing attacks are among the oldest and most loved tricks of cybercriminals to manipulate humans with...

View Article


Image may be NSFW.
Clik here to view.

What harm can computer viruses cause?

It’s often said that coders can make or break the internet. They make the internet by creating great apps, websites, software etc., and can also mar the internet through malicious programs like...

View Article

Image may be NSFW.
Clik here to view.

Social Engineering Attack Life Cycle: The Art of Human Hacking

In the beginning, social engineering was an art of social science. It is used to change people’s behaviour and make changes in society. It looks at a lot of groups, including government, media,...

View Article

Image may be NSFW.
Clik here to view.

Digital footprint: All about electronic footprint and how to leave minimal...

Whenever we browse anything on the internet or perform any activity, we leave our trails on the internet. Those trails are digital trails and are called digital footprints. Here we have used the word...

View Article


Image may be NSFW.
Clik here to view.

Must know Phishing statistics in 2023

The year 2022 encompassed some major surprises in the cybersecurity arena. Where organisations had all their protective gears on, still a lot happened that was beyond human control. But we are here to...

View Article

Image may be NSFW.
Clik here to view.

What are Apple Pay Scams and How to Avoid Them?

Did you know that Apple Pay has a $2500 apple cash card limit? If someone steals your credit card information from an online purchase, they can use it to buy over $2500 worth of goods. These card...

View Article

Image may be NSFW.
Clik here to view.

Social engineering statistics you must know 

It is rightly said that the weakest link, even in a most cyber-secure environment, is the human being which renders the entire organisation as vulnerable as the weakest link. Playing games with the...

View Article


Image may be NSFW.
Clik here to view.

Clone Phishing Attacks: Spotting the Imposters and Securing Your Inbox

Phishing attacks continue to plague individuals and businesses worldwide, with clone phishing emerging as a particularly cunning and deceptive variant. But fear not, as this blog post will arm you...

View Article


Image may be NSFW.
Clik here to view.

Mastering Phishing and Social Engineering Virtual Communication Awareness

/*! elementor - v3.21.0 - 18-04-2024 */ .elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a...

View Article
Browsing all 10 articles
Browse latest View live