Cyber Security: Social Engineering and Techniques

Social Engineering

Phishing

Types of Phishing

  • Spear Phishing: The victim or target is researched more in depth to make the phishing campaign look more realistic.
  • Whaling: Employees or founders within a company with high level position are targeted due to having more access and control over sensitive data.
  • Smishing: Phishing campaigns that take place over SMS. Text message will appear to come from someone of trust.
  • Vishing: Phishing campaigns that take place over a voice communications channel. Phone call will appear to come from someone of trust.

Spam

Dumpster Diving

Shoulder Surfing

Tailgating

Pharming

Impersonation

Scam

Conclusion

--

--

--

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How To Stop Spam Registration in php

GDPR BINGO

Blizzard Jailbreak

An Amateur’s Top 4 Tips for Resolving Password Issues

How to avoid online auction fraud

5 Ways Artificial Intelligence Reinvigorate the Cybersecurity

LastChance | The Reminder Bot

About a Sucuri RCE…and How Not to Handle Bug Bounty Reports

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Jesse L

Jesse L

More from Medium

3rd Simple & White-collar things about CyberSecurity

ESP32 : How to Use 16x2 LCD Display without I2C

Top 5 Reasons Why You Should Consider a Career in Cybersecurity

Vulnhub: RED: 1 (Walkthrough)