Quantcast
Channel: Social Engineering Archives | TechSpective
Browsing all 11 articles
Browse latest View live

Top Unusual Cybersecurity Hacking Strategies

The internet introduced us to the new digital world. Any illusion that the internet would be safe and free from threats was shattered, however, in 1988 with the introduction of the Morris Worm. In the...

View Article


Exposing Targeted Attacks by Observing Privilege Interactions Between Entities

In May 2019, most of Baltimore’s government computer systems were infected with a new and aggressive ransomware variant named RobbinHood. All servers, with the exception of essential services, were...

View Article

Need for Better Employee Protection is Apparent During Cybersecurity...

National Cybersecurity Awareness Month is upon us again, and it’s a great time to be reminded that the top cause of corporate data breaches is phishing. The very nature of phishing is to elicit an...

View Article

Social Engineers are No Match for Artificial Intelligence

We are still in the early days of artificial intelligence, but it is quickly becoming an essential part of how organizations defend themselves. Using advanced algorithms, enterprises are improving...

View Article

Everyone’s Creating Fake Social Media Accounts, Including Homeland Security

Over the last few years, we have all had to accept that social media platforms can and will be used by nefarious actors to achieve their ends. In fact, in many cases, these nefarious actors appear to...

View Article


Shashi Prakash Chats about Cryptocurrency and NFT Fraud

TechSpective Podcast Episode 055 One of the hot trends right now is the NFT. NFT–pronounced by some as “nifty” because it is catchier than saying N-F-T–stands for “non-fungible token”. NFTs exist in a...

View Article

Jayson Street – Hacking and Social Engineering and Why There are No ‘Black...

TechSpective Podcast Episode 063 What is a hacker? This is a question that has been debated for decades in the cybersecurity arena. Media conflated hacker and cybercriminal very early on, and it has...

View Article

SlashNext Generative HumanAI Proactively Defends against Generative AI Attacks

Business email compromise (BEC) is a sophisticated form of cybercrime that involves the use of email to deceive and defraud businesses. Attackers impersonate a trusted individual or entity, such as a...

View Article


Ransomware and Social Engineering Threats Are Real

With the start of Q4 and Cybersecurity Awareness Month, the last three quarters have witnessed exponential growth in the severity and number of attacks. A report by Malwarebytes in August showed that...

View Article


The Imperative Role Parents Play in Ensuring Their Children’s Safety While...

In today’s digital age, our children are growing up in a world that is vastly different from the one we knew as kids. With the internet and video games becoming an integral part of their lives, the...

View Article

Avoid the Dangerous IRS Phishing Scams During Tax Season

It’s tax season once again, when scammers start working overtime to deceive unwitting taxpayers into giving away personal information or sending in money for phony tax preparation services, or even...

View Article
Browsing all 11 articles
Browse latest View live