7 Tips To Keep Your Email Account Secure
Most people send emails every day. Therefore, protecting your email account is a must. Especially when you know that emails are the favourite way for hackers to access your data....
Welcome to the Social Engineering archives of the Mailfence Blog.
Most people send emails every day. Therefore, protecting your email account is a must. Especially when you know that emails are the favourite way for hackers to access your data....
Vishing is a combination of “voice” and “phishing”. It refers to phishing scams done over the phone. Individuals are tricked into revealing critical financial or personal information during seemingly trustworthy...
Smishing is a social engineering attack using phishing techniques, but sent by text message instead of email. The name is a combination of SMS and phishing. In this post, you’ll...
Quid pro quo is a kind of social engineering attack where a hacker promises a profit in exchange for information that can later be used to steal money, data, or...
A whaling attack is a social engineering technique involving scam emails imitating senior individual messages to target high-ranking executives. As such, it’s a form of executive phishing, like spear phishing....
What is tailgating? Tailgating is a physical Social Engineering attack where someone seeks entry to a restricted area where they are not allowed to be. A definition of tailgating in...
What is baiting? A “lucky winner” gets a free digital audio player. In fact, this offer compromises any computer it is plugged to – No so lucky huh !! This...
Do you need email security? Email has become an indispensable tool to communicate for many people. The shared data might be confidential, or not, but you have a right to...
If you have read our posts related to social ingineering ploys (phishing, smishing, whaling and vishing), you already know that many kinds of scams are derived from phishing. But it’s...
Phishing (pronounced “fishing”) is a kind of identity theft that is growing in popularity amongst hackers. By using fraudulent websites and false emails, fake phone calls, and whatnot – perpetrators attempt...