Information Security Social Engineering

What is Spear Phishing?

Forget mass-spam emails. A spear phishing attack is a targeted approach to accessing an individual via email. Hackers will research and find information others wouldn’t know about a high-worth individual. This data might come from social media or search engines. They’ll then use the data to create intriguing emails harboring a disguised virus download or […]

Pen Testing Social Engineering

What is Red Teaming?

Red teaming, in short, involves a team of security experts simulating an extended attack on an entire organisation to identify and test potential weaknesses.  Red teaming is the cyber security equivalent to: “The best defence is a good offence”. The attacking team uses strategic teamwork to exploit physical, hardware, software, and human vulnerabilities across an […]

Social Engineering
hooded hacker next to female victim

What is Social Engineering? Types & Prevention

Social engineering is the process of criminals manipulating people into performing actions or divulging confidential information to their advantage. Social engineering attacks can be carried out in person, over the phone, or via email. When targeting individuals, the aim is usually to obtain passwords and banking information through tricking users or installing malicious software that […]