Social Engineering Series: Tailgating

Social Engineering Series: Tailgating

Social Engineering Series: Tailgating Our final post in our social engineering series has to do with tailgating. Tailgating, also known as ‘piggybacking,’ is when an attacker uses others to get access to an otherwise restricted area. Perhaps s/he simply walks in a...
Social Engineering Series: Pretexting

Social Engineering Series: Pretexting

Social Engineering: Pretexting What is pretexting? Pretexting is a social engineering hack where the bad actor creates a false identity in order to obtain privileged information. The hacker builds trust with the intended victim, and manipulates them into giving...
Social Engineering Series: Whaling

Social Engineering Series: Whaling

Social Engineering Series: Whaling An advanced form of a phishing attack, whaling is used to gather personal information, login credentials, and other data. The targets are private business and government executives. These bad guys are going after ‘the big fish.’ The...

Pin It on Pinterest