Blog Posts Tagged with "Social Engineering"

7fef78c47060974e0b8392e305f0daf0

Social Engineering: The Tainted PDF and a Sales Call

January 12, 2012 Added by:Infosec Island Admin

Generally, people just aren’t thinking all that much when they get these calls. Sure, people should never be asking them for their passwords, but now this. Open this file would you? Tell me how many pages it has to verify that you got it, would you?

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Backtrack 5: Penetration Testing with Social Engineering Toolkit

January 11, 2012 Added by:Dan Dieterle

Why spend days, weeks or even months trying to penetrate layers of network security when you can just trick a user into running a file that allows you full access to their machine and bypasses anti-virus, firewalls and many intrusion detection systems?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Attacks Feed Affiliate Marketing Scams

January 04, 2012 Added by:Headlines

"After users first click on the scams, malware or malicious scripts are to blame for the further spread of slightly over half the analyzed scams, with those falling into three main categories: likejacking, rogue applications, and malware or self-XSS..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

How Not to Recruit Spies Online and Off

December 21, 2011 Added by:Infosec Island Admin

One must look at the range and breadth of companies and entities being broken in to by the likes of China to see that no one is exempt. Know the ins and outs of the technology as well as the spook landscape, especially if you work in infosec today, lest you become the next target...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Symantec: Anatomy of a Nitro Cyber Attack

December 13, 2011 Added by:Headlines

"They are sending targets a password-protected archive... which contains a malicious executable. The executable is a variant of Poison IVY and the email topic is some form of upgrade to popular software, or a security update. The most recent email brazenly claims to be from Symantec..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Human Security is Weaker than IT Security

December 06, 2011 Added by:Robert Siciliano

Information technologies have evolved to a level at which the developers, programmers, and security specialists all know what they’re doing, and are able to produce products and services that work and are reasonably secure. Of course, there’s always room for improvement...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

CERT Warns of Holiday Phishing and Malware Campaigns

December 06, 2011 Added by:Headlines

"US-CERT encourages users and administrators to use caution when encountering email messages and take the following preventative measures to protect themselves from phishing scams and malware campaigns..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Password Cracking Methods

December 05, 2011 Added by:Headlines

"A rainbow table is a list of pre-computed hashes - the numerical value of an encrypted password, used by most systems today - and that’s the hashes of all possible password combinations for any given hashing algorithm mind..."

Comments  (2)

Bd623fa766512fdf6b57db66f522b741

#EntSec -- Not Business Relevant

October 26, 2011 Added by:Ali-Reza Anghaie

Enterprise Security is Not Business Relevant. Now, that's quite the inflammatory statement but unless your business is security then it's true in practice today. Before the flaming begins let me start by saying I believe firmly it ~IS~ business critical but I want to make it actually relevant...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Are You Cyber Savvy?

October 25, 2011 Added by:Joel Harding

What really set him apart was Social Engineering combined with his hacking. He did his research, he would study, he would probe, and then he would do whatever it took to get a password, to get a free account, to get root access, to get into a facility and physically touch the system...

Comments  (0)

0356a83ecb15c8e33b00560d7bebe47f

Six Security Assessments You’ve Never Had But Should

October 24, 2011 Added by:Stephen Marchewitz

You probably are familiar with the classic security assessments: internal and external penetration testing, security risk assessments, and PCI gap assessments. Consider performing these six assessments at least once in your organization to combat the constantly looming hacker threat...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Operation Hackerazzi Leads to Intrusion Indictment

October 13, 2011 Added by:Headlines

A man accused of targeting the entertainment industry by hacking into the personal e-mail accounts of celebrities was arrested after being charged with accessing protected computers without authorization, damaging protected computers, wiretapping, and aggravated identity theft...

Comments  (0)

B09c361cbdc6cf629affdc7db30a186d

Friends, Foes and Faceless Denizens – The Real Social Network

September 14, 2011 Added by:Steven Fox, CISSP, QSA

The successful compromises of physical security on my social engineering engagements have been enabled by information gleaned from Facebook / MySpace pages. In these cases, my research allowed me to influence employee behavior to circumvent logical and physical access controls...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS: Natural Disasters Fostering Social Engineering

August 25, 2011 Added by:Headlines

The DHS's National Cybersecurity and Communications Integration Center (NCCIC) is warning that malicious users may seek to exploit interest related to physical events such as earthquakes and hurricanes by generating phishing emails with subject lines related to the incidents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Releases User Security Guide

August 19, 2011 Added by:Headlines

The guide offers some fairly good advice and illustrative graphics on how to spot common scams and other mischief. It is written in simple enough terms that you, your kids, and your grandparents can all increase your Facebook security outlook a great deal in a matter of only a few minutes...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Myth: Apple Products Don’t Get Viruses

August 16, 2011 Added by:Robert Siciliano

The growing popularity of Apple products has inspired cybercriminals to create viruses that will harm Macs. Until now, Macs have been immune to these threats, but McAfee Labs is seeing the very first wave of fake programs targeted at Mac users...

Comments  (3)

Page « < 4 - 5 - 6 - 7 - 8 > »