Blog
Attacks to Critical Infrastructure Are Real, & They Can be Incredibly Easy
By Tripwire Guest Authors on Wed, 12/20/2017
In our previous article, we started to lay out some important social engineering terms, such as phishing, spear-phishing and pretexting. We even introduced to you what we call “Potentially Unwanted Leaks” (PUL) as tidbits of information that, when out in the wild, become valuable nuggets to be used against you in a social engineering attack. This...