by Julio Del Cid | Apr 10, 2019 | Cybersecurity, Phishing Attack, Social Engineering
What are whaling attacks? In whaling attacks, cybercriminals will attack those victims who are well-known employees of the company or employees who hold the higher position in the company such as CEO (Chief Executive Officer), CFO (Chief Finance Officer) and so on....
by Julio Del Cid | Apr 4, 2019 | Cybersecurity, Social Engineering
What is a social engineering attack? Social Engineering includes a series of malicious attacks that intercept sensitive information by manipulating the communications between individuals. This kind of attacks usually results from human errors which means an attacker...
by Julio Del Cid | Mar 28, 2019 | Cybersecurity, Security Threats and Network attacks, Social Engineering
What is a watering hole attack? The watering hole is used to attack a group of victims by injecting malicious code into websites’ pages. This attack installs the malware or trojan into the ender user’s system when the user visits the infectious web page which is...
by Julio Del Cid | Mar 27, 2019 | Social Engineering
What is pretexing? Pretexting is an attack to gain information which an opposite person does not want to share such as personal details, company’s confidential data and so on. In this attack, a cybercriminal will pretend as someone else to manipulate victim to gain...
by Julio Del Cid | Mar 22, 2019 | Phishing Attack, Social Engineering
Phishing The phishing attack is the most common and effective way of hacking to access someone’s intimate information. In this attack, an attacker will use different ways or methods such as electronic mails (Emails), short message service (SMS), and so on to influence...
by Julio Del Cid | Mar 22, 2019 | Social Engineering