Phishing

37d5f81e2277051bc17116221040d51c

Phishers Ties Up Victims Phones, Killing Notification

May 22, 2010 Added by:Robert Siciliano

Many of today’s automated processes are designed with security and/or convenience in mind. For example, if a credit card companies’ anomaly detection software detects irregular spending on your credit card the software may freeze your account or call you to make sure you are in-fact the one making the charge. While this may help to secure you, it also may inconvenience you if yo...

Comments  (0)

37d5f81e2277051bc17116221040d51c

10 Ways To Prevent Phishing

May 19, 2010 Added by:Robert Siciliano

The Anti Phishing Working Group published a new report seeking to understand such trends by quantifying the scope of the global phishing problem, especially by examining domain name usage and phishing site uptimes. Phishing has always been attractive to criminals because it has low start-up costs and few barriers to entry.

Comments  (0)

694eabca410cc15c81fab9dc514a629e

Would you like to meet an Identity Thief?

May 03, 2010 Added by:Bruno Pavlicek

Much has been written on the topic of Identity Theft. But what do we really know about the identity thieves themselves. Who are they? How do they operate? What motivates them? To begin with, one needs to appreciate that America is plagued with an endless epidemic of identity theft.

Comments  (3)

38829f9c58dc699a3ef4caf9edf69b9a

Is Social Engineering being overlooked as a modern day security threat?

April 13, 2010 Added by:Michael Bruck

Organizations are more often asking to include a social engineering evaluation, but it still surprises me just how many of them have not previously had a formal SE evaluation process in place until we do our first audit with them. I get “oh, our accounting firm calls into our user base from time to time” or “our outsourced network support vendor has tried to get confidential user...

Comments  (1)

D13f77e036666dbd8f93bf5895f47703

How to Avoid the New BOTNET Herders

March 31, 2010 Added by:Theresa Payton

There’s a new game in town offering jobs to anyone with a home office and a computer.   Be careful what you or your kids accept when applying for jobs online.  You or your kids may be accepting a job working for a cybercriminal outfit.

Comments  (2)

39d0a8908fbe6c18039ea8227f827023

The limits of social network privacy

March 19, 2010 Added by:Mike Himley

The Lone Ranger was one of my favorite shows growing up. With his trusty side kick Tonto, he would always appear just in time to foil the bad guys and leave everyone wondering..."who is that masked man?"  Was it really that hard to determine his identity?

Comments  (2)

B59a51a3c0bf9c5228fde841714f523a

How Twitter spam steals from Google, Yahoo!

March 06, 2010 Added by:Chester Wisniewski

Scammers have been devising ways to ride on someone else's coattails since the dawn of time. With every new technology they find another way to make money from nothing. Today I am going to highlight a method that involves Twitter, Yahoo!, and Google AdSense.

Comments  (0)

00fd6160b9db2d91e663a578d87cbaf3

Social Engineering at the White House and Your Enterprise

February 28, 2010 Added by:Wayde York

What does our enterprise information have in common with President Obama and Vice President Biden? The need for constant protection. Your enterprise data needs protection from the host of technical and human threats that seem to evolve daily. The President and Vice President require the same protection, albeit amplified due to their position in the world power scheme.

Comments  (0)

0f48ebb4a6ca02dbf5141affdbfa6898

Flattery is in the Eye of the Beholder

February 19, 2010 Added by:Bill Wildprett, CISSP, CISA

Some very interesting research came to my attention the other day, courtesy of the ISC2.org CISSPforum on Yahoo Groups, pointing to an article in Scientific American that discussed why flattery is effective.

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »