Extremely Easy Security — Learn Social Engineering in Plain English (1.1 Part 2)

It looked much better in my head. Also, this drawing provides absolutely no clarity between phishing and whaling whatsoever.

Whaling

Dumpster Diving

Shoulder Surfing

Pharming

Tailgating

Eliciting Information

A stranger offers beer to Steve and Steve tells him his credit card number before accepting the beer. Make sure to only reveal sensitive private information after accepting beer.

Prepending

Identity Fraud

That was supposed to be a bear. I am really sorry. I do not know why he looks so depressed or has wings for hands.

Invoice Scams

Credential Harvesting

Reconnaissance

Hoax

Impersonation

Watering Hole Attack

Next Up: Err… Part 3 isn’t out yet, but if you want updates, you can subscribe to my blog. Yay!

--

--

--

Writer, ethical hacker, humorist. Extremely Easy Security.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

ForTube Reaches the Galaxy

De-Militarized Zone — Network’s Living Room

Our Journey to Support STIX 2.1

A Providerless Network Sees the Big Picture — Noam Naveh

Chronicle Cybersecurity Predictions: Crimeware, Cloud and Beyond

#DFC morning news August 11,

Functional NFTs, Partnership News, and Dutch Team Member

Sensitive data exposure through GitHub: A deep dive into bug ocean

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
easysecurity

easysecurity

Writer, ethical hacker, humorist. Extremely Easy Security.

More from Medium

HTB:Chatterbox Walkthrough

Extremely Simple Security — Learn Cyber Threats, Attacks & Vulnerabilities (Social Engineering, 1.1)

Hack The Box: Fawn

THM Advent-of-cyber 2021 Day19