Blog Posts Tagged with "Social Engineering"


Security Awareness: Social Engineering Part Two

September 10, 2010 Added by:Sean Inman

There are many ways that a perpetrator may prey on the trusting human nature to gain access to information or systems. Here are several examples of social engineering methods, along with suggestions to minimize the likelihood that such methods will be successful...

Comments  (1)


Stealing Secrets: Social Engineering on the Phone

September 09, 2010 Added by:Robert Siciliano

Recognize that while you are generally not being swindled by those who call you, there is a chance that you may be. This means having systems in place regarding what can be said to whom, when, and why. Training on social engineering and how to prevent it is a must for any company...

Comments  (2)


Security Awareness: Social Engineering Part One

August 30, 2010 Added by:Sean Inman

Like fraudsters generally, social engineers take advantage of human gullibility. In a corporate context, social engineering is a factor in many information security incidents, including those perpetrated by insiders...

Comments  (0)


Is Your Company Vulnerable to Social Engineering?

August 05, 2010 Added by:Katie Weaver-Johnson

With just two phone calls, a hacker posing as a Louisiana-based employee handling claims involving the Gulf oil spill was able to trick a computer support employee at BP into divulging sensitive information that could have proved crucial in launching a network attack...

Comments  (3)


Phone Jamming and Your Security

July 30, 2010 Added by:Guy Pace

Financial institutions set up a number of security questions to try to positively identify you when you call. Unfortunately, most of the standard questions are very lame, and the answers are easy to find...

Comments  (0)


Hackers Play Social Engineering Capture the Flag At Defcon

July 13, 2010 Added by:Robert Siciliano

Defcon is known for its antics but it’s also an event where hackers of all flavors improve their skills. The game they are playing this year is a social engineering fun-o-rama called Social Engineering CTF, referencing the game Capture the Flag...

Comments  (1)


Backtrack 4: Penetration Testing with Social Engineering Toolkit

June 29, 2010 Added by:Dan Dieterle

People do not understand how dangerous it is to click on unknown links in an e-mail or even on a website. Hackers will disguise their malware shell and make it look very appealing. Be it a video codex that you must install to watch a video that you really want to watch or even a webpage that tells you that you have a virus and you must install and run the latest online anti-virus scanner to remove...

Comments  (4)


10 Ways To Prevent Phishing

May 19, 2010 Added by:Robert Siciliano

The Anti Phishing Working Group published a new report seeking to understand such trends by quantifying the scope of the global phishing problem, especially by examining domain name usage and phishing site uptimes. Phishing has always been attractive to criminals because it has low start-up costs and few barriers to entry.

Comments  (0)


DATA LEAKAGE a la Digital Copy Machine

May 06, 2010 Added by:David Jordan

Why spend time attempting to HACK an enterprise network when the wanted data is rolling out the door of the target facility each time a copier is replaced!

Comments  (6)


Social Engineering at the White House and Your Enterprise

February 28, 2010 Added by:Wayde York

What does our enterprise information have in common with President Obama and Vice President Biden? The need for constant protection. Your enterprise data needs protection from the host of technical and human threats that seem to evolve daily. The President and Vice President require the same protection, albeit amplified due to their position in the world power scheme.

Comments  (0)


So, you wanna network online too?

December 30, 2009 Added by:Fred Williams

I previously listed ways to gain valuable information on hacking targets using little work and no dumpster diving. The previous post was geared towards attacks computer systems but not human targets.What is a little more interesting is attacking specific people. This is one of the key issues behind Facebook' recent privacy issues. Never mind a user setting a "privacy filter" ...

Comments  (2)

Page « < 6 - 7 - 8 - 9 - 10 > »
Most Liked