Blog

Read our articles here

Publications

  • Social Engineering Attack Detection Model: SEADM

    Social engineering is a real threat to industries in this day and age even though the severity of it is extremely downplayed.

    Read More
  • Development of Cognitive Functioning Psychological Measures for the SEADM

    Social engineering is a real threat to industries in this day and age, even though its severity is extremely downplayed. The difficulty with social engineering attacks is mostly the ability to identify them.

    Read More
  • Social Engineering from a Normative Ethics Perspective

    Social engineering is deeply entrenched in both computer science and social psychology. Knowledge on both of these disciplines is required to perform social engineering based research. There are several ethical concerns and requirements that need to be ta

    Read More
  • Protecting E-mail Anonymity with an Anonymizer Bouncer

    Communication between people has always been a part of society. In the past, people could omit the return address from a letter to keep the sender's identity private.

    Read More
  • Towards an Ontological Model Defining the Social Engineering Domain

    The human is often the weak link in the attainment of Information Security due to their susceptibility to deception and manipulation. Social Engineering refers to the exploitation of humans in order to gain unauthorised access to sensitive information.

    Read More
  • Social Engineering Attack Framework

    The field of information security is a fast growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and the human element is thus a weak link.

    Read More
  • Necessity for Ethics in Social Engineering Research

    Social engineering is deeply entrenched in the fields of both computer science and social psychology. Knowledge is required in both these disciplines to perform social engineering based research.

    Read More
  • Social Engineering Attack Detection Model: SEADMv2

    Information security is a fast-growing discipline, and therefore the effectiveness of security measures to protect sensitive information needs to be increased.

    Read More
  • Social Engineering Attack Examples, Templates and Scenarios

    The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and the human element thus remains a weak link.

    Read More