Everyone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today.
IT jargon: a glossary of cybersecurity terms
Beware of these social engineering tactics
As the spectacle and competitive atmosphere of the Rio Olympic Games have drawn the world’s attention, hackers who use social engineering are inching closer to our private information. Although our systems may be prepared for the likes of malware and worms, social engineering is a different beast of its own.
“BEWARE OF THE WOLF IN SHEEP’S CLOTHING”…Further Exploration Into Social Engineering…by dStringer
Oh my goodness...!
Not too long ago, I wrote a "Social Engineering" blog that I thought was pretty detailed. It discussed different types of "Social Engineering" in depth; warning signs and what steps to take if you feel you've been victimized.
It truly is the Wild West out there.
You must be logged in to post a comment.