Articles about Social Engineering

Socially engineered email attacks prove to be more effective

Social Engineering

The latest quarterly threat report from Abnormal Security shows that increasingly sophisticated and novel socially engineered email attacks that bypass legacy defenses are driving 50 percent higher engagement than traditional email attacks such as credential phishing.

The report also shows that between the first week of July 2020 and the first week of April 2021, the percentage of companies across industries getting hit with vendor email compromise (VEC) attacks increased nearly 120 percent.

Continue reading

The most destructive cybersecurity threats in 2021

Tightrope sharks threat

With companies relying more on technology, such as web applications, third-party solutions, and cloud computing than ever before, corporate cybersecurity has had to become the backbone of modern businesses. In the presence of remote work environments where IoT security has never been more vulnerable, companies need to effectively and quickly adapt to the rapidly evolving methods and techniques that hackers are beginning to employ.

Business vulnerabilities like a weak human firewall could lead to an increased susceptibility to a variety of cybersecurity attacks, such as ransomware and DDOS attacks. But despite all of these challenges, comprehensive and reliable cybersecurity solutions are very much achievable when approached correctly. In order to protect yourself against contemporary security threats, however, one must first understand the threats and risks they are trying to prevent and mitigate.

Continue reading

How to avoid social engineering attacks

Social Engineering

Social engineering is a method of obtaining confidential information by psychologically manipulating or deceiving people to pursue a certain course of action. It is a popular tactic among hackers as it is easier to exploit human psychology rather than hacking a network or looking for security vulnerabilities.

The following are the most common forms of digital social engineering assaults:

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.