Search Tag: social engineering

IT Management

2017 04 Jul

A cyberattack does not occur spontaneously for it requires some planning and preparation. These attacks make use of a variety of techniques, including methods of social engineering, and they are prepared stealthily and a long time in advance, says IT security expert Stefan Rass, associate professor at the Institute for Applied Informatics (InfAI),...Read more

IT Management

2017 28 Jun

Cybercriminals are adjusting their social engineering tactics to focus on the more vulnerable members of an organisation: the junior staff. While top executives who usually have wide-ranging digital access can be considered as prime targets, they also are likely more capable of protecting themselves and their assets against possible phishing attacks....Read more