social engineering

/Tag: social engineering

Two Common Types of Cybersquatting

In this article we talk about two common types of cybersquatting. In a much earlier post we wrote about ways cybersquatting harms an organization. Start here as it defines what cybersquatting is. Our example domain name for the two types of cybersquatting attacks we're using is example.com. We’ll assume that this is the legitimate website [...]

Bsquared Intel’s Ultimate Holiday Shopping Cyber Security Guide

This article contains an affiliate link for ProtonVPN which we have an independent partnership with. Welcome to Bsquared Intel’s Ultimate Holiday Shopping Cyber Security Guide! If you are one of the 158 million people that the National Retailers Federation estimates will go shopping this Black Friday [Source: Yahoo! News] it’s a good time to keep [...]

Project Warwalk: PII, Social Engineering, and OSINT

Welcome back to the sixth entry of our research project, Project Warwalk. If this is your first time here, hello! To read the other entries related to this series and check out the glossary, click here . This entry to this series marks a distinctive shift when we’re talking about WiFi and specifically SSIDs. The [...]

Project Warwalk: It’s All About the Numbers

Welcome back to the second installment of Project Warwalk. If you’re just tuning in, start here to learn about what this project is and use the Glossary for your reference. In this post, we’ll be laying out the numbers for you and how they will pop up in the future articles in this series. The [...]

Google Calendar Phishing and How to Reduce Your Exposure to It

While sitting with one of our clients recently they mentioned to us that they kept getting event invites/notifications on Google Calendar that were phishing attempts or spam. They finally sent us a screenshot and we dug into the matter to learn more. In short, phishing Google Calendar has been going on for months, based on [...]

Sextortion: 12 Tips to Help Protect Yourself

If you have stumbled on this post, you are probably here for one of two reasons. You want to understand what sextortion is because maybe you're unfamiliar with term, or someone threatened to expose some compromising details about you. In this post we are going to talk about things you need to do immediately and [...]