SMiShing: Your Guide to SMS Phishing

By now, you’re well aware of phishing and the threat it presents. You probably even think twice before clicking a link sent to you by a stranger. But, just as you’ve gotten familiar with the latest cyber threat, a new threat emerges. SMiShing.

Read more

What is Vishing? Your Guide to Voice Phishing

Anyone who grew up in the days of landline phones and star 67 knows that manipulating people over the phone is a time tested source of entertainment for bored kids. However, sometimes those kids grow up and continue to deceive people over the phone, using their skills to scam organizations and individuals.

Read more

Recognizing Social Engineering: 11 Tips to Identify an Attack

Social engineering is essentially the hacking of a human. These exploits have a long history that predates the rise of the internet and even computers. They remain relevant in today’s tech-driven world because it is much easier to hack a human than it is to hack into software or hardware.

This post dives into what social engineering is, the different types of social engineering, some ways to recognize a social engineering attack, and tips to avoid falling victim to social engineering scams.

Read more

Def Con From a Twinstater’s Perspective

I have always been interested in the offensive security field and its benefits to businesses and people. I believe that sometimes, people don’t understand a threat unless it has directly affected them or someone they know. I was recently promoted to the position of Cyber Security Specialist at Twinstate Technologies®, but more notably, am known as the Social Engineering Technician and Wireless Penetration Tester. As a key member of the Red Team here at Twinstate, I couldn’t have been more excited to travel to Las Vegas and attend my very first Def Con.

Read more

Social Engineering Techniques and Your Privacy and Security

Clicking “Like” on a Tweet, tagging yourself in a photo on Facebook; today, almost everyone has at least one form of social media account where information is shared openly within their immediate friend circle. But in reality, your information is shared far beyond your network and can easily be captured by social engineering criminals who are looking to exploit your privacy and security.

Read more