Blog Posts Tagged with "Impersonators"

3e35900ae6facc6c146a85c435c71d82

Misinformation and Manipulation in the Age of Social Media

August 21, 2012 Added by:Ben Rothke

Terms such as revolutionary, and groundbreaking are often used in reference to the web and social media. The web and social media have also been so for scammers, thieves, liars, manipulators, and the like who use social media in a big way. To avoid being caught in their lair, it is imperative to know the risks...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Four Defendants Charged in Credit Card Skimming Scheme

August 21, 2012 Added by:Headlines

Four men were arrested for their roles in an identity theft scheme involving the theft of credit card numbers used to fraudulently purchase fuel at gas stations in order to be sold, distributed, or otherwise used by the defendants in order to obtain criminal proceeds...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Army Translator Re-Sentenced for Possession of Classified Docs

August 06, 2012 Added by:Headlines

The defendant took classified documents from the U.S. Army without authorization. While assigned to an intelligence group in the 82nd Airborne Division of the U.S. Army at Al Taqqadam Air Base, he downloaded a classified electronic document and took hard copies of several other classified documents...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Cyber Criminals Prey on Worried Parents

August 02, 2012 Added by:Theresa Payton

Cyberthieves are trolling the internet for information and with a convincing phone call trying to trick parents out of thousands of dollars. It sounds like this scam would be easy to spot but it’s so scary, so emotional, and happens so often even Western Union employees are trained to ask questions...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Wanna Buy Some Dumps?

July 07, 2012 Added by:Robert Siciliano

“Dumps” are batches of stolen credit card numbers. This example of a criminal’s sales pitch for stolen dumps came to me through a comment on a blog post I wrote about credit card security. Go figure. If you scan the following message line by line, you’ll see there’s a great deal of thought put into the pitch...

Comments  (13)

94ae16c30d35ee7345f3235dfb11113c

Request for Information: Social Engineering Using Social Media

June 25, 2012 Added by:Joel Harding

We’ve been saying for years that the human element is the weakest link in cybersecurity. Kevin Mitnick (out of prison now and doing well) was an extremely talented hacker but what set him apart was his research into potential victims and then having the audacity to social engineer them...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Social Engineering: A True Story of Incredible Deception

May 31, 2012 Added by:Ben Rothke

In the vernacular of infosec, Tania Head was a type of social engineer. In the book Social Engineering: The Art of Human Hacking, Christopher Hadnagy details how attackers use social engineering to manipulate people into performing actions or divulging information...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Is Business or Corporate Identity Theft?

May 30, 2012 Added by:Robert Siciliano

Victims of business identity theft often do not find out about the crime until significant losses accumulate, or someone discovers discrepancies on the books. Because of the hidden nature of the transactions, businesses can lose vast amounts of money. Business identity theft can remain unde­tected for years...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Security Measures to Protect Business Twitter Accounts

April 27, 2012 Added by:Robert Siciliano

Hacking a business Twitter account is a favorite pastime for those wanting retribution, and for others it’s just plain fun. Once the businesses Twitter account is hacked their reputation is sullied making them look like they aren’t protecting their client’s data either...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Social Engineering and SCADA Security

April 24, 2012 Added by:Infosec Island Admin

Social engineering attempts can be highly targeted and conducted in a way that is much more difficult to detect than the spam and phishing emails we receive in our inbox. Phone-based social engineering attempts were recently experienced at two or more power distribution companies...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Social Media vs. Old School

April 11, 2012 Added by:Joel Harding

As I’ve stumbled through the discovery process of social media I have also uncovered a myriad of problems. I got a phone call from a great friend in the Pentagon warning me that someone was posing as a PSYOP senior and trying to make contacts through LinkedIn...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

On Hacking Humans at the RSA Conference

March 06, 2012 Added by:

RSA was a veritable cornucopia of data collection. There were no firewalls, human IDS/IPS or content filtering at this show. People openly discussed strategic plans, engineering specs and tactical activities whether over morning coffee or late night shots of Patron...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Operation Hackerazzi Leads to Intrusion Indictment

October 13, 2011 Added by:Headlines

A man accused of targeting the entertainment industry by hacking into the personal e-mail accounts of celebrities was arrested after being charged with accessing protected computers without authorization, damaging protected computers, wiretapping, and aggravated identity theft...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Faux Security: BlackBerg Security and Shades of Project Viglio

July 13, 2011 Added by:Infosec Island Admin

Personally, I had never heard of Joe Black until he started tweeting his craziness. Over time though, he just progressively got crazier and crazier with comments and challenges to the likes of LulzSec, who then allegedly hacked him and showed him just how poor his site security was...

Comments  (34)

69dafe8b58066478aea48f3d0f384820

Bank Employee Arrested for Hijacking Accounts

May 26, 2011 Added by:Headlines

Hurtado secretly accessed U.S. Bank’s computer system and changed the contact information for the accounts of two elderly customers. After changing their contact information, Hurtado then allegedly closed these accounts and took out cashier’s checks for the balance of each account...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Ten Types of Criminal Social Media Impersonators

March 09, 2011 Added by:Robert Siciliano

Rather than looking at the information provided by the user, go deeper to identify the computer being used so that negative behaviors are exposed early and access to threatening accounts are denied before your business reputation is damaged and your users abused...

Comments  (1)