Blog Posts Tagged with "Social Engineering"

7fef78c47060974e0b8392e305f0daf0

The FBI Discusses Internet Social Networking Risks

April 05, 2012 Added by:Infosec Island Admin

Social networking sites have created a revolution in connectivity. However, con artists, criminals, and other actors are exploiting this capability for nefarious purposes. There are primarily two tactics used to exploit social networks. In practice, they are often combined...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS: Don’t be Fooled by Too Good to be True Websites

April 03, 2012 Added by:Headlines

According to a recent report, the fan craze created by the film The Hunger Games has created the perfect opportunity for devious cybercriminals to take advantage of Internet users. While clicking on a link may seem innocent enough, it can actually infect your device...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Protect Yourself from Vishing Scams

March 30, 2012 Added by:Robert Siciliano

Vishing occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft...

Comments  (0)

09dae715e355968a0e90ebddf038ad56

How to Hack Into the Music Industry

March 29, 2012 Added by:Quintius Walker

When it comes to the vulnerabilities presented by the online aspects of the music industry, the opportunities for penetration tester’s to employ their skills are far and wide. However, they are still for the most part often overlooked. And with great peril...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

OTA Updates April Fool’s List to Combat Spear Phishing

March 29, 2012 Added by:Headlines

“While businesses are making efforts, all too often they are overlooking the fundamentals which could curb upwards of 90% of online threats to their data. We have a shared responsibility to harden our systems and those of our customers..."

Comments  (0)

09dae715e355968a0e90ebddf038ad56

Just One of the Reasons Why I Love Anonymous

March 28, 2012 Added by:Quintius Walker

In the world of cyber-security things transform at the speed of light. From exploits to methods, what worked yesterday is not the solution tomorrow. Ethical problem solving students should do themselves a favor and study the ways of the infamous idea known to us as Anonymous...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Ecava IntegraXor Path Traversal Vulnerability

March 26, 2012 Added by:Infosec Island Admin

Researchers Billy Rios and Terry McCorkle have identified a Path Traversal vulnerability when a specially crafted HTML document is opened on the Ecava IntegraXor server. Successful exploitation could allow file manipulation or arbitrary code execution...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Social Networks and the Deactivated Friend Attack

March 23, 2012 Added by:Pierluigi Paganini

During a conference at the IEEE's International Workshop on Security and Social Networking SESOC 2012 in Lugano, Switzerland, researchers presented on a new critical vulnerability on Facebook, a zero day privacy loophole that they have named the "Deactivated Friend Attack"...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Hackers Target Social Media for Social Engineering Attacks

March 22, 2012 Added by:Dan Dieterle

Hackers are getting much better at their craft, and people are making it very easy for them. A Social Engineer will use information gathered about a person, place or business in specially crafted attacks that play on people’s thoughts, beliefs or emotions...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Social Media Security Basics: An Infographic

March 22, 2012 Added by:Fergal Glynn

Social networking has quickly become a major medium for communications for both individuals and organizations, but the platforms that allow the development of online personae are not without their own inherent risks. These social media security basics everyone should embrace...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Black Hat Europe 2012 Roundup

March 20, 2012 Added by:Javvad Malik

An underlying theme throughout the event from nearly everyone I spoke to was that people are still neglecting the basics. Rafal Los and Shane MacDougall gave an interesting talk on offensive threat modeling for attackers where they took the attackers viewpoint on threats...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Use of Social Networks for Cyber Espionage

March 13, 2012 Added by:Pierluigi Paganini

There has been an upsurge in cyber espionage by governments in search of information relating to military and industrial technologies. Of strategic importance for these activities are social networks through which one can trace a target's relationships, habits, and location...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

You’ve Been Phished Without an Email or a PDF

March 12, 2012 Added by:Infosec Island Admin

It seems that someone is making a full sized driftnet for information on those who would like to sign up as well as discuss the INSCOM Cyber Brigade. On the surface like I said, this looks all well and good, but once you start to poke at it though, you get some strange answers...

Comments  (16)

0ff0a77035f9569943049ed3e980bb0d

On Hacking Humans at the RSA Conference

March 06, 2012 Added by:

RSA was a veritable cornucopia of data collection. There were no firewalls, human IDS/IPS or content filtering at this show. People openly discussed strategic plans, engineering specs and tactical activities whether over morning coffee or late night shots of Patron...

Comments  (2)

82ac4cd789b46af43c0cde730625317e

How to Protect Yourself from Skimmers

February 28, 2012 Added by:Christopher Rodgers

When you swipe your credit or debit card, are you handing over your personal information to criminals? Skimming is a process scammers use to steal credit or debit card information. Scammers use devices called skimmers to accomplish skimming in everyday transactions...

Comments  (0)

8ab4e596af60cabbf46c7ecf016af0ad

Is LinkedIn Really Secure?

February 24, 2012 Added by:Brittany Lyons

LinkedIn has faced scams and viral attacks, and users have watched private information become public without their permission. Online vulnerability is a problem, and though LinkedIn has addressed issues in a punctual manner, this does not prevent new problems from arising...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »