Impersonation

B59a51a3c0bf9c5228fde841714f523a

How Twitter spam steals from Google, Yahoo!

March 06, 2010 Added by:Chester Wisniewski

Scammers have been devising ways to ride on someone else's coattails since the dawn of time. With every new technology they find another way to make money from nothing. Today I am going to highlight a method that involves Twitter, Yahoo!, and Google AdSense.

Comments  (0)

00fd6160b9db2d91e663a578d87cbaf3

Social Engineering at the White House and Your Enterprise

February 28, 2010 Added by:Wayde York

What does our enterprise information have in common with President Obama and Vice President Biden? The need for constant protection. Your enterprise data needs protection from the host of technical and human threats that seem to evolve daily. The President and Vice President require the same protection, albeit amplified due to their position in the world power scheme.

Comments  (0)

0f48ebb4a6ca02dbf5141affdbfa6898

Flattery is in the Eye of the Beholder

February 19, 2010 Added by:Bill Wildprett, CISSP, CISA

Some very interesting research came to my attention the other day, courtesy of the ISC2.org CISSPforum on Yahoo Groups, pointing to an article in Scientific American that discussed why flattery is effective.

Comments  (0)

D5e39323dd0a7b8534af8a5043a05da2

So, you wanna network online too?

December 30, 2009 Added by:Fred Williams

I previously listed ways to gain valuable information on hacking targets using little work and no dumpster diving. The previous post was geared towards attacks computer systems but not human targets.What is a little more interesting is attacking specific people. This is one of the key issues behind Facebook' recent privacy issues. Never mind a user setting a "privacy filter" ...

Comments  (2)

Page « < 6 - 7 - 8 - 9 - 10 > »