Tales from a Social Engineer – Romance Scams
In this weeks ‘Tales from a Social Engineer’, Gyles talks us through Romance scams. They start with a simple hook but can lead to someone spending thousands on someone that doesn’t exist.
Find Out MoreFeature development & monitoring tips
In this weeks ‘Tales from a Social Engineer’, Gyles talks us through Romance scams. They start with a simple hook but can lead to someone spending thousands on someone that doesn’t exist.
Find Out MoreIn part 2 of ‘Tales from a Social Engineer’, Gyles talks us through Phishing methods and how its still to this day one of the best means of intrusion to a business, for both physical and cyber.
Find Out MoreThis the start of a Social Engineering Series by consultant Gyles Saunders, covering tales from the front lines and going in depth on strategies and methodology to give you clearer understanding of this method.
Find Out MoreThis blog post aims to give a brief insight into some of the various lengths a criminal will go to gain a foothold on your business to enable them to gain entry to your premises. With some remediation steps at the end to demonstrate how even the simplest tactics can dissuade a criminal from getting at your assets and data.
Find Out MoreIntroduction to Spear Phishing In a previous blog post, we explained the Basics of Phishing. This post will go into detail on Spear Phishing. What is Spear Phishing? Phishing involves a scam, transported via electronic communication, that aims to steal sensitive data or lead a user to a bogus site containing malware. Spear Phishing differs […]
Find Out MoreWhat is Phishing? Phishing Definition Phishing is an example of Social Engineering, and is defined as the fraudulent attempt to obtain sensitive information, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. How does Phishing Work? These form of attacks rely on a communication, such as a text message or […]
Find Out More