1. Technology

Articles related to social engineering

Social Engineering Attacks - Antivirus - About.com
What is social engineering and how can you minimize your own risk of being socially engineered? Plus, common techniques used by social engineers and ...
http://antivirus.about.com/od/securitytips/tp/socialengineeringattacks.htm
Social Engineering - Top Five Reasons People Fall Victim to Social ...
To avoid becoming thei next victim of a social engineering attack, you must learn to filter through the available clues and make the right decisions. To help you ...
http://antivirus.about.com/od/securitytips/tp/socialengineeringexcuses.htm
What are Social Engineering Attacks? - Antivirus - About.com
Oct 10, 2008 ... A social engineering attack is one in which the intended victim is somehow tricked into doing the attacker's bidding. An example would be ...
http://antivirus.about.com/b/2008/10/10/what-are-social-engineering-attacks.htm
Definition of Social Engineering - Identity Theft - About.com
Social engineering techniques are considered con games which are performed by con artists. The targets of social engineering may never realize they have ...
http://idtheft.about.com/od/glossary/g/Social_Engineer.htm
What is Social Engineering? - Mobile Devices - About.com
The concept of social engineering has been present since the advent of the Internet. However, with the advancement in technology and the resulting entry of  ...
http://mobiledevices.about.com/od/glossary/g/What-Is-Social-Engineering.htm
Enterprise Social Engineering FAQ - Mobile Devices - About.com
Question: What is Social Engineering and What Should Enterprises Know about it? We all know how important it is to maintain online security in the enterprise ...
http://mobiledevices.about.com/od/additionalresources/f/Enterprise-Social-Engineering-FAQ.htm
Spear Phishing: Targeted Social Engineering Attacks - Antivirus
This creates another vector for social engineering attackers. Those most at risk of in-game spear phishing are players that work in sensitive sectors such as the ...
http://antivirus.about.com/od/emailscams/a/Spear-Phishing.htm
How to Guard Against Phishing & Social Engineering Attacks
Phishing and other forms of social engineering attacks can trick you into handing over the keys to your virtual online kingdom. Don't let the criminals scam you.
http://antivirus.about.com/od/securitytips/a/How-To-Guard-Against-Phishing-And-Social-Engineering-Attacks.htm
Social Engineering: Methods Enterprises can Use to Minimize Risks
Social engineering is on the rise today and no company or organization is immune to this very real threat. While most people are aware of this problem, not  ...
http://mobiledevices.about.com/od/additionalresources/a/Social-Engineering-Methods-Enterprises-Can-Use-To-Minimize-Risks.htm
5 Common Strategies Employed by Social Engineers - Mobile Devices
The first and foremost method a social engineer would use is to convince his victim about his trustworthiness. In order to accomplish this task, he could either ...
http://mobiledevices.about.com/od/additionalresources/tp/5-Common-Strategies-Employed-By-Social-Engineers.htm
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10      Next

©2014 About.com. All rights reserved.