Social Engineering

Experience our research

Explore Our Social Engineering Papers

Advanced Research on Social Engineering Threats

Delve into our studies to understand, detect, and mitigate the human vulnerabilities exploited in social engineering attacks.

Phishing with Malicious QR Codes

It works, proving the QR codes a convenient way of passing a sly but credential-harvesting URL.

Woman scanning QR Code

“Alexa, What’s a Phishing Email?”: Training Users to Spot Phishing Emails Using a Voice Assistant

Alexa, phish or not? Help me reel it in.

Man at voting booth voting on an election ballet.

Socially Engineering a Polarizing Discourse on Facebook through Malware-Induced Misperception

Making and breaking the spiral-of-silence on social media. All through an “invisible” malware that simply rewords posts to read counter-argumentative.

Person screaming at phone.
Alexa in Phishingland: Empirical Assessment of Susceptibility to Phishing Pretexting in Voice Assistant Environments

Hey Alexa, read my emails. Sure, they seem legit. Do you want me to reply on your behalf? Hm…. Check out how one could use Alexa for pretexting and intelligence to maximize a phishing attack.

Woman speaking on phone to voice assistant.

i

Social Engineering