Plato Data Intelligence.
Vertical Search & Ai.

Tag: Social Engineering

13 major Artificial Intelligence trends to watch for in 2019

Artificial Intelligence (AI) has the peculiar ability to simultaneously amaze, enthrall, leave us gasping and intimidate. The possibilities of AI are innumerable and...

What is Phishing?

Reading Time: 3 minutesPhishing or Phishing attack is a type of social engineering attack carried out by the online criminals who send out...

What is Phishing? | Prevent Phishing Email Attack Using Dome Antispam

Reading Time: 3 minutesPhishing or Phishing attack is a type of social engineering attack carried out by the online criminals who send...

Video: Social Engineering At Work – How to use positive influence to gain management buy-in for anything @DerbyCon

The first published recording of “Social Engineering At Work – How to use positive influence to gain management buy-in for anything“. Recorded at DerbyCon...

Social Engineering At Work: Some books that have helped me

I speak about using “Social Engineering at work” – how to gain and utilize positive influence to get things done – to help...

This Tick Can Fly Through Airgaps

Reading Time: 4 minutesAn airgapped machine is a computer that is so heavily secured that it has no physical or digital connections to...

Tick Attacking Airgap Machines using Symonloader Malware | Comodo

Reading Time: 4 minutesAn airgapped machine is a computer that is so heavily secured that it has no physical or digital connections...

New Variant of Sigma Ransomware | Subpoena Scare Users in Russia

Reading Time: 5 minutesWould you be scared or at least anxious if you’d found a subpoena to the US district court in...

From Russia with Subpoena: New Variant of Sigma Ransomware to Scare Users

Reading Time: 5 minutesWould you be scared or at least anxious if you’d found a subpoena to the US district court in your...

Phishing Trap for Microsoft Users | Phishing Attacks – Comodo

Reading Time: 4 minutesPhishing trap for One Drive users. How to avoid falling prey? Cybercriminals often use very cunning and inventive tricks to manipulate...

FacexWorm a Malicious Chrome Extension Now Found on Facebook

Reading Time: 4 minutesDo you use Facebook Messenger? Do you use Chrome on your desktop? Do you also use Bitcoin and have...

Facebook Distributed Trojan Targets Cryptocurrency

Reading Time: 1 minuteDo you use Facebook Messenger? Do you use Chrome on your desktop? Do you also use Bitcoin and have a...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?