Social Engineering

Experience our research

Explore Our Social Engineering Papers

Advanced Research on Social Engineering Threats

Delve into our studies to understand, detect, and mitigate the human vulnerabilities exploited in social engineering attacks.

Phishing with Malicious QR Codes

It works, proving the QR codes a convenient way of passing a sly but credential-harvesting URL.

“Alexa, What’s a Phishing Email?”: Training Users to Spot Phishing Emails Using a Voice Assistant

Alexa, phish or not? Help me reel it in.

Socially Engineering a Polarizing Discourse on Facebook through Malware-Induced Misperception

Making and breaking the spiral-of-silence on social media. All through an “invisible” malware that simply rewords posts to read counter-argumentative.

Alexa in Phishingland: Empirical Assessment of Susceptibility to Phishing Pretexting in Voice Assistant Environments

Hey Alexa, read my emails. Sure, they seem legit. Do you want me to reply on your behalf? Hm…. Check out how one could use Alexa for pretexting and intelligence to maximize a phishing attack.

Trusted by 15k+ Users Worldwide

Patterns included

A short explanation about the service you can offer to your future clients.

Lightning fast

A short explanation about the service you can offer to your future clients.

It’s responsive

A short explanation about the service you can offer to your future clients.

Growing user base

A short explanation about the service you can offer to your future clients.

Free theme

A short explanation about the service.

How it works

Show Your Clients the Right Steps

1.

Start with One

Show steps needed for growth, the less the easier on the eye.

2.

Then proceed to Dos

Show steps needed for growth, the less the easier on the eye.

3.

Hello from Japan – San

Show steps needed for growth, the less the easier on the eye.

4.

This is Quatre

Show steps needed for growth, the less the easier on the eye.

Bullet points

Check the Most Important Facts

The more you tell about your service or project, the easier your client’s decision will be. We’ll go first, wish us luck!

Multiple block patterns included

Multiple fonts included

Lemmony icon block

Lemmony auto write block

How it works

Show Your Clients the Right Steps

1.

Start with One

Show steps needed for growth, the less the easier on the eye.

2.

Then proceed to Dos

Show steps needed for growth, the less the easier on the eye.

3.

Hello from Japan – San

Show steps needed for growth, the less the easier on the eye.

4.

This is Quatre

Show steps needed for growth, the less the easier on the eye.

Social Engineering