Publications

Read our publications here

Social Engineering Attack Detection Model: SEADM

Social engineering is a real threat to industries in this day and age even though the severity of it is extremely downplayed.

Read More

Development of Cognitive Functioning Psychological Measures for the SEADM

Social engineering is a real threat to industries in this day and age, even though its severity is extremely downplayed. The difficulty with social engineering attacks is mostly the ability to identify them.

Read More

Social Engineering from a Normative Ethics Perspective

Social engineering is deeply entrenched in both computer science and social psychology. Knowledge on both of these disciplines is required to perform social engineering based research. There are several ethical concerns and requirements that need to be ta

Read More

Protecting E-mail Anonymity with an Anonymizer Bouncer

Communication between people has always been a part of society. In the past, people could omit the return address from a letter to keep the sender's identity private.

Read More

Towards an Ontological Model Defining the Social Engineering Domain

The human is often the weak link in the attainment of Information Security due to their susceptibility to deception and manipulation. Social Engineering refers to the exploitation of humans in order to gain unauthorised access to sensitive information.

Read More

Social Engineering Attack Framework

The field of information security is a fast growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and the human element is thus a weak link.

Read More

Necessity for Ethics in Social Engineering Research

Social engineering is deeply entrenched in the fields of both computer science and social psychology. Knowledge is required in both these disciplines to perform social engineering based research.

Read More

Social Engineering Attack Detection Model: SEADMv2

Information security is a fast-growing discipline, and therefore the effectiveness of security measures to protect sensitive information needs to be increased.

Read More

Social Engineering Attack Examples, Templates and Scenarios

The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and the human element thus remains a weak link.

Read More

Blog Posts

  • Featured

    Anonymous Remailers VS Identity Theft

    Identity theft can have a large impact on an individual, especially if the identity is in the hands of a social engineer.

    Read More
  • Featured

    Psychology behind Social Engineering

    Being the victim of social engineering can be rather degrading and leave you feeling violated. It is key to remember that at no point are you to blame for being the victim of these types of cyber attacks, after all, it is the social engineer's intention t

    Read More
  • Featured

    What is Social Engineering

    Current definitions specify different ideas as to what social engineering involves. However, the only element that all of these definitions have in common is that a human is exploited in order to gain some unauthorised information or perform some action.

    Read More