Security Blog

Feature development & monitoring tips

Category: Phishing

October 18, 2022

Phishing: Taking a Multi-layered Defence Approach

Phishing: Taking a Multi-layered Defence Approach What is Phishing? You have most likely heard the term phishing thrown around social media recently, and no, people haven’t taken up a new hobby at the local lake. The first known mention of the term “phishing” stems from a program named AOHell designed in the 1990s.One of the […]

Find Out More
February 22, 2021

Tales from a Social Engineer – Phishing

In part 2 of ‘Tales from a Social Engineer’, Gyles talks us through Phishing methods and how its still to this day one of the best means of intrusion to a business, for both physical and cyber.

Find Out More
August 16, 2018

What is Clone Phishing?

This blog post covers Clone Phishing. What is Clone Phishing? How can you protect yourself from this Social Engineering attack?

Find Out More
August 15, 2018

What is Whaling?

What is Whaling? In a previous blog post, we explained the basics of Phishing. This post will go into detail on another type of Social Engineering called Whaling. Whaling is a type of Phishing attack that is targeted towards high-profile individuals. This may be people such as Corporate Executives, Politicians or Celebrities. In this case, the […]

Find Out More
July 24, 2018

Introduction to Spear Phishing

Introduction to Spear Phishing In a previous blog post, we explained the Basics of Phishing. This post will go into detail on Spear Phishing. What is Spear Phishing? Phishing involves a scam, transported via electronic communication, that aims to steal sensitive data or lead a user to a bogus site containing malware. Spear Phishing differs […]

Find Out More
July 4, 2018

What is Phishing?

What is Phishing? Phishing Definition Phishing is an example of Social Engineering, and is defined as the fraudulent attempt to obtain sensitive information, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. How does Phishing Work? These form of attacks rely on a communication, such as a text message or […]

Find Out More