Social Engineering: What is Phishing?
Phishing is the most well-known social engineering attack, where a cyberattacker pretends to be a reliable source to make their victims reveal their personal information or download malware. According to...
Welcome to the Social Engineering archives of the Mailfence Blog.
Phishing is the most well-known social engineering attack, where a cyberattacker pretends to be a reliable source to make their victims reveal their personal information or download malware. According to...
If you’re like most people, you probably don’t know much about social engineering. Or you believe it only aims to dupe unsuspecting victims to steal some money. But what you...
Scareware is a social engineering technique that aims to scare the victim into believing they have a virus on their device and should buy or download specific software. As many...
“Zombie” is the term used when an attacker takes control of your computer without your knowledge. A zombie attack aimed either to steal your sensitive information or to make...
Our smartphones, computers, tablets, and other electronic gadgets are so much a part of our daily lives that it is now inconceivable not to take them with us when travelling...
Most people send emails every day. Therefore, protecting your email account is a must. Especially when you know that emails are the favourite way for hackers to access your data....
Vishing is a combination of “voice” and “phishing”. It refers to phishing scams done over the phone. Individuals are tricked into revealing critical financial or personal information during seemingly trustworthy...
Smishing is a social engineering attack using phishing techniques, but sent by text message instead of email. The name is a combination of SMS and phishing. In this post, you’ll...
Quid pro quo is a kind of social engineering attack where a hacker promises a profit in exchange for information that can later be used to steal money, data, or...
A whaling attack is a social engineering technique involving scam emails imitating senior individual messages to target high-ranking executives. As such, it’s a form of executive phishing, like spear phishing....