Posts Tagged ‘Social Engineering’

Most Recent
 
Read More
2017-12-29

How to use Wayback Machine

There is a very interesting and useful project – a web archive on the Internet – Internet archive Wayback Machine. An organization called the Internet Archive, which was established in 1996 in San Francisco. The archive of the Internet pages is designed to preserve, familiarize and study the information available for all these years in the worldwide network.

229
 
Read More
2017-10-26

How To Catch a Cheater

The Internet and many applications are so closely integrated into our lives that we sometimes do not imagine life without them. It can be not only our helper, but also play against us.

 

515
 
Read More
2017-08-04

The basic of social engineering

George V. Hulme and Joan Goodchild collected in one article the foundations of social engineering. Social engineering is essentially the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques. Famous hacker Kevin Mitnick helped popularize the term ‘social engineering’ in the ’90s, although the idea and many of the techniques have been around as long as there have been scam artists of any sort.

304
 
Read More
2016-12-31

Do you Know What’s the Difference Between Social Engineering and Phishing Scams?

As world practice shows successfully conducted breakups (successfully attacking, of course), most of the problems associated with it problems with people. To be more precise – it is in their ability to give any information or to make a completely wacky action. Such terms as “phishing” and “social engineering” is often interpreted in relation to the types of scams.

 

91
Latest Headlines
 
Read More
727
 
Read More
397
 
Read More
775

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics