Social engineering

How clever social engineering can overcome two-factor authentication… or not?

If you have a Google account you must have two-factor authentication enabled in order to prevent anyone to use your account by just having your username and password. If you don’t know how to do that, check my free eBook here. 2FA requires something that you know (username and password) and something that you have (smartphone) in order to allow access to your account.Unless somebody gets all of them, they simply can’t steal your account. Until now… Alex MacCaw has published screenshots from a new scam appeared that is targeting Google users who have two-factor authentication enabled (2FA). It works like this:…


No Picture

The three most common web based attacks and how to protect against them

Cybercriminals increasingly are attacking enterprises at their weakest point: the end user device. New forms of malware and social engineering attacks threaten your users every day, and even more so as they expand their use of Web-based applications. 1. Drive-by downloads. Users are visiting known websites that have a good reputation and don’t even think that it might be possible that something wrong can happen. If such website had some vulnerabilities or was simply hacked and the cybercriminals manipulated it to serve malware, then a huge amount of users can be endangered. A drive-by download happens usually by of fooling the user…


No Picture

The biggest threats in the mobile world: social engineering and malicious apps

The growth of the smart devices (smartphones, iPhones, tablets, intelligent TVs and so on) brought not only joy to the owners. The average consumer of these devices is not security aware. He will try any software and will take any offer, even those which sound too good to be true. 1. The biggest threat for smartphones is social engineering. Social engineering is a way of manipulating people by making use of the human curiosity, greed and ignorance for some topics. If the user sees something interesting he will click and give it a try. On mobile devices this is even…



By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close