by Renjith Gopalakrishnan | Sep 30, 2017 | Social Engineering, Vulnerability Assessment and Penetration Testing
Social Engineering – Attack Vectors Phishing The target/victim is manipulated with the appearance possessed by the attacker that he/she represents a legitimate source. The victim receives emails from the fraudulent but appeared to be a prominent source with the...
by Noel Mathew | Sep 24, 2017 | Android, Smart Phone, Vulnerability Assessment and Penetration Testing
Mobile Applications have become an essential part of our lives as our dependence on smartphones has grown. But many users are unaware of the security of their devices. A recent study on the state of application security that “84 percent of mobile app users...
by Renjith Gopalakrishnan | Sep 23, 2017 | Social Engineering, Vulnerability Assessment and Penetration Testing
Social Engineering – Attack Cycle Reconnaissance Attack vectors are determined by the information gathered. Information from the target/victim can be inferred and assembled in various ways that include potential and probable passwords, catalog and distinguish...
Recent Comments