Blog Posts Tagged with "Social Engineering"

C7159a557369b66632c4b54bf746b69e

Security Awareness: Social Engineering Part Two

September 10, 2010 Added by:Sean Inman

There are many ways that a perpetrator may prey on the trusting human nature to gain access to information or systems. Here are several examples of social engineering methods, along with suggestions to minimize the likelihood that such methods will be successful...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Stealing Secrets: Social Engineering on the Phone

September 09, 2010 Added by:Robert Siciliano

Recognize that while you are generally not being swindled by those who call you, there is a chance that you may be. This means having systems in place regarding what can be said to whom, when, and why. Training on social engineering and how to prevent it is a must for any company...

Comments  (2)

C7159a557369b66632c4b54bf746b69e

Security Awareness: Social Engineering Part One

August 30, 2010 Added by:Sean Inman

Like fraudsters generally, social engineers take advantage of human gullibility. In a corporate context, social engineering is a factor in many information security incidents, including those perpetrated by insiders...

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Is Your Company Vulnerable to Social Engineering?

August 05, 2010 Added by:Katie Weaver-Johnson

With just two phone calls, a hacker posing as a Louisiana-based employee handling claims involving the Gulf oil spill was able to trick a computer support employee at BP into divulging sensitive information that could have proved crucial in launching a network attack...

Comments  (3)

9fd81843ad7f202f26c1a174c7357585

Phone Jamming and Your Security

July 30, 2010 Added by:Guy Pace

Financial institutions set up a number of security questions to try to positively identify you when you call. Unfortunately, most of the standard questions are very lame, and the answers are easy to find...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Hackers Play Social Engineering Capture the Flag At Defcon

July 13, 2010 Added by:Robert Siciliano

Defcon is known for its antics but it’s also an event where hackers of all flavors improve their skills. The game they are playing this year is a social engineering fun-o-rama called Social Engineering CTF, referencing the game Capture the Flag...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Backtrack 4: Penetration Testing with Social Engineering Toolkit

June 29, 2010 Added by:Dan Dieterle

People do not understand how dangerous it is to click on unknown links in an e-mail or even on a website. Hackers will disguise their malware shell and make it look very appealing. Be it a video codex that you must install to watch a video that you really want to watch or even a webpage that tells you that you have a virus and you must install and run the latest online anti-virus scanner to remove...

Comments  (4)

37d5f81e2277051bc17116221040d51c

10 Ways To Prevent Phishing

May 19, 2010 Added by:Robert Siciliano

The Anti Phishing Working Group published a new report seeking to understand such trends by quantifying the scope of the global phishing problem, especially by examining domain name usage and phishing site uptimes. Phishing has always been attractive to criminals because it has low start-up costs and few barriers to entry.

Comments  (0)

0a809ca78b9aa5393c0cb7dad7eb6a3a

DATA LEAKAGE a la Digital Copy Machine

May 06, 2010 Added by:David Jordan

Why spend time attempting to HACK an enterprise network when the wanted data is rolling out the door of the target facility each time a copier is replaced!

Comments  (6)

00fd6160b9db2d91e663a578d87cbaf3

Social Engineering at the White House and Your Enterprise

February 28, 2010 Added by:Wayde York

What does our enterprise information have in common with President Obama and Vice President Biden? The need for constant protection. Your enterprise data needs protection from the host of technical and human threats that seem to evolve daily. The President and Vice President require the same protection, albeit amplified due to their position in the world power scheme.

Comments  (0)

D5e39323dd0a7b8534af8a5043a05da2

So, you wanna network online too?

December 30, 2009 Added by:Fred Williams

I previously listed ways to gain valuable information on hacking targets using little work and no dumpster diving. The previous post was geared towards attacks computer systems but not human targets.What is a little more interesting is attacking specific people. This is one of the key issues behind Facebook' recent privacy issues. Never mind a user setting a "privacy filter" ...

Comments  (2)

Page « < 6 - 7 - 8 - 9 - 10 > »