Tagged: Social Engineering

Welcome to the Social Engineering archives of the Mailfence Blog.

Social Engineering Phishing

Social Engineering: What is Phishing?

Phishing is the most well-known social engineering attack, where a cyberattacker pretends to be a reliable source to make their victims reveal their personal information or download malware. According to...

Social Engineering – Was ist Scareware?

Social Engineering: What is Scareware?

Scareware is a social engineering technique that aims to scare the victim into believing they have a virus on their device and should buy or download specific software. As many...

Protect devices travelling

Tips To Protect Your Devices When Travelling

Our smartphones, computers, tablets, and other electronic gadgets are so much a part of our daily lives that it is now inconceivable not to take them with us when travelling...

How to make email secure

7 Tips To Keep Your Email Account Secure

Most people send emails every day. Therefore, protecting your email account is a must. Especially when you know that emails are the favourite way for hackers to access your data....

what is vishing

Social Engineering: What is Vishing?

Vishing is a combination of “voice” and “phishing”. It refers to phishing scams done over the phone. Individuals are tricked into revealing critical financial or personal information during seemingly trustworthy...

what is smishing

Social Engineering: What is Smishing?

Smishing is a social engineering attack using phishing techniques, but sent by text message instead of email. The name is a combination of SMS and phishing. In this post, you’ll...

Social engineering quid pro quo attack

Social engineering: Quid Pro Quo attacks

Quid pro quo is a kind of social engineering attack where a hacker promises a profit in exchange for information that can later be used to steal money, data, or...

Whaling social engineering

Social Engineering: What is Whaling ?

A whaling attack is a social engineering technique involving scam emails imitating senior individual messages to target high-ranking executives. As such, it’s a form of executive phishing, like spear phishing....