Phishers Ties Up Victims Phones, Killing Notification

May 22, 2010 Added by:Robert Siciliano

Many of today’s automated processes are designed with security and/or convenience in mind. For example, if a credit card companies’ anomaly detection software detects irregular spending on your credit card the software may freeze your account or call you to make sure you are in-fact the one making the charge. While this may help to secure you, it also may inconvenience you if yo...

Comments  (0)


10 Ways To Prevent Phishing

May 19, 2010 Added by:Robert Siciliano

The Anti Phishing Working Group published a new report seeking to understand such trends by quantifying the scope of the global phishing problem, especially by examining domain name usage and phishing site uptimes. Phishing has always been attractive to criminals because it has low start-up costs and few barriers to entry.

Comments  (0)


Would you like to meet an Identity Thief?

May 03, 2010 Added by:Bruno Pavlicek

Much has been written on the topic of Identity Theft. But what do we really know about the identity thieves themselves. Who are they? How do they operate? What motivates them? To begin with, one needs to appreciate that America is plagued with an endless epidemic of identity theft.

Comments  (3)


Is Social Engineering being overlooked as a modern day security threat?

April 13, 2010 Added by:Michael Bruck

Organizations are more often asking to include a social engineering evaluation, but it still surprises me just how many of them have not previously had a formal SE evaluation process in place until we do our first audit with them. I get “oh, our accounting firm calls into our user base from time to time” or “our outsourced network support vendor has tried to get confidential user...

Comments  (1)


How to Avoid the New BOTNET Herders

March 31, 2010 Added by:Theresa Payton

There’s a new game in town offering jobs to anyone with a home office and a computer.   Be careful what you or your kids accept when applying for jobs online.  You or your kids may be accepting a job working for a cybercriminal outfit.

Comments  (2)


The limits of social network privacy

March 19, 2010 Added by:Mike Himley

The Lone Ranger was one of my favorite shows growing up. With his trusty side kick Tonto, he would always appear just in time to foil the bad guys and leave everyone wondering..."who is that masked man?"  Was it really that hard to determine his identity?

Comments  (2)


How Twitter spam steals from Google, Yahoo!

March 06, 2010 Added by:Chester Wisniewski

Scammers have been devising ways to ride on someone else's coattails since the dawn of time. With every new technology they find another way to make money from nothing. Today I am going to highlight a method that involves Twitter, Yahoo!, and Google AdSense.

Comments  (0)


Social Engineering at the White House and Your Enterprise

February 28, 2010 Added by:Wayde York

What does our enterprise information have in common with President Obama and Vice President Biden? The need for constant protection. Your enterprise data needs protection from the host of technical and human threats that seem to evolve daily. The President and Vice President require the same protection, albeit amplified due to their position in the world power scheme.

Comments  (0)


Flattery is in the Eye of the Beholder

February 19, 2010 Added by:Bill Wildprett, CISSP, CISA

Some very interesting research came to my attention the other day, courtesy of the CISSPforum on Yahoo Groups, pointing to an article in Scientific American that discussed why flattery is effective.

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »