Skip to content
Courses
DSA to Development
Get IBM Certification
Newly Launched!
Master Django Framework
Become AWS Certified
For Working Professionals
Interview 101: DSA & System Design
Data Science Training Program
JAVA Backend Development (Live)
DevOps Engineering (LIVE)
Data Structures & Algorithms in Python
For Students
Placement Preparation Course
Data Science (Live)
Data Structure & Algorithm-Self Paced (C++/JAVA)
Master Competitive Programming (Live)
Full Stack Development with React & Node JS (Live)
Full Stack Development
Data Science Program
All Courses
Tutorials
Data Structures & Algorithms
ML & Data Science
Interview Corner
Programming Languages
Web Development
CS Subjects
DevOps And Linux
School Learning
Practice
Build your AI Agent
GfG 160
Problem of the Day
Practice Coding Problems
GfG SDE Sheet
Contests
Accenture Hackathon (Ending Soon!)
GfG Weekly [Rated Contest]
Job-A-Thon Hiring Challenge
All Contests and Events
DSA
Practice Problems
Python
C
C++
Java
Courses
Machine Learning
DevOps
Web Development
System Design
Aptitude
Projects
Sign In
▲
Similar Topics
Web Technologies
39.2k+ articles
DSA
22.4k+ articles
Python
20.3k+ articles
Experiences
17k+ articles
Interview Experiences
13.9k+ articles
JavaScript
11.6k+ articles
School Learning
11.4k+ articles
Java
10.5k+ articles
Ethical Hacking
690+ articles
Ethical Hacking - Malware Analysis
16 articles
Ethical Hacking - Social Engineering
5 posts
Popular Articles
Recent Articles
What is Scareware?
Last Updated: 25 June 2023
Scareware is a form of malware that combines social engineering tactics with the manipulation of users' emotions to cause shock, anxiety, or
...read more
Ethical Hacking
Ethical Hacking - Malware Analysis
Ethical Hacking - Social Engineering
How to Hide Payload in Images using ExifTool?
Last Updated: 26 April 2025
Hiding payloads in images is a well known technique used in Cyber Security to hide malicious data within seemingly harmless files. This meth
...read more
Picked
Ethical Hacking
Ethical Hacking - Social Engineering
Active Social Engineering Defense (ASED)
Last Updated: 12 September 2022
A proactive tactic called Active Social Engineering Defense (ASED) is used to lessen the risk of being the target of social engineers. We mu
...read more
Picked
Ethical Hacking
Ethical Hacking - Social Engineering
Similar Topics
Web Technologies
39.2k+ articles
DSA
22.4k+ articles
Python
20.3k+ articles
Experiences
17k+ articles
Interview Experiences
13.9k+ articles
JavaScript
11.6k+ articles
School Learning
11.4k+ articles
Java
10.5k+ articles
Ethical Hacking
690+ articles
Ethical Hacking - Malware Analysis
16+ articles
How Hackers Use Social Engineering to Get Passwords on Facebook?
Last Updated: 21 August 2022
Social engineering is a powerful method for hackers to exploit computer systems without the use of malware or computer hacking tools. To car
...read more
Picked
Ethical Hacking
Ethical Hacking - Social Engineering
Pretexting in Social Engineering
Last Updated: 12 August 2022
Pretexting is a social engineering technique that's used by hackers, spammers, and pranksters to assume and exploit the trust of an individu
...read more
Picked
Ethical Hacking
Ethical Hacking - Social Engineering
1
1
1
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our
Cookie Policy
&
Privacy Policy
Got It !