Items Tagged with "Social Engineering"


16443e0c6f6e4a400fd0164b3c406170

Use Your Horse Sense, Don't Be a Mule

November 01, 2010 Added by:Christopher Burgess

Ever opened your email inbox and seen a request to assist a fledgling company with their accounts receivables for a percentage of each transaction? These offers may be seen as a way to bring a few extra dollars, but they may be a front for any number of organized criminal entities...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

The Reinvigoration Of Social Engineering

October 25, 2010 Added by:PCI Guru

As I constantly like to remind everyone, security is not perfect. Social engineering is one of the most insidious attack techniques around. Unfortunately, organizations do little to address social engineering and have only made social engineering easier over the years...

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Social Engineering: Need $11K? Ask a Wal-Mart Employee

September 24, 2010 Added by:Katie Weaver-Johnson

In a recent incident, a man called a 24-hour Wal-Mart in Ohio and explained to an associate that he was with Wal-Mart’s IT department and needed the associate to activate several gift cards, read to him the card numbers and then provide the authorization codes from the back of the cards...

Comments  (1)

C7159a557369b66632c4b54bf746b69e

Security Awareness: Social Engineering Part Two

September 10, 2010 Added by:Sean Inman

There are many ways that a perpetrator may prey on the trusting human nature to gain access to information or systems. Here are several examples of social engineering methods, along with suggestions to minimize the likelihood that such methods will be successful...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Stealing Secrets: Social Engineering on the Phone

September 09, 2010 Added by:Robert Siciliano

Recognize that while you are generally not being swindled by those who call you, there is a chance that you may be. This means having systems in place regarding what can be said to whom, when, and why. Training on social engineering and how to prevent it is a must for any company...

Comments  (2)

C7159a557369b66632c4b54bf746b69e

Security Awareness: Social Engineering Part One

August 30, 2010 Added by:Sean Inman

Like fraudsters generally, social engineers take advantage of human gullibility. In a corporate context, social engineering is a factor in many information security incidents, including those perpetrated by insiders...

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Is Your Company Vulnerable to Social Engineering?

August 05, 2010 Added by:Katie Weaver-Johnson

With just two phone calls, a hacker posing as a Louisiana-based employee handling claims involving the Gulf oil spill was able to trick a computer support employee at BP into divulging sensitive information that could have proved crucial in launching a network attack...

Comments  (3)

9fd81843ad7f202f26c1a174c7357585

Phone Jamming and Your Security

July 30, 2010 Added by:Guy Pace

Financial institutions set up a number of security questions to try to positively identify you when you call. Unfortunately, most of the standard questions are very lame, and the answers are easy to find...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Hackers Play Social Engineering Capture the Flag At Defcon

July 13, 2010 Added by:Robert Siciliano

Defcon is known for its antics but it’s also an event where hackers of all flavors improve their skills. The game they are playing this year is a social engineering fun-o-rama called Social Engineering CTF, referencing the game Capture the Flag...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Backtrack 4: Penetration Testing with Social Engineering Toolkit

June 29, 2010 Added by:Dan Dieterle

People do not understand how dangerous it is to click on unknown links in an e-mail or even on a website. Hackers will disguise their malware shell and make it look very appealing. Be it a video codex that you must install to watch a video that you really want to watch or even a webpage that tells you that you have a virus and you must install and run the latest online anti-virus scanner to remove...

Comments  (4)

37d5f81e2277051bc17116221040d51c

10 Ways To Prevent Phishing

May 19, 2010 Added by:Robert Siciliano

The Anti Phishing Working Group published a new report seeking to understand such trends by quantifying the scope of the global phishing problem, especially by examining domain name usage and phishing site uptimes. Phishing has always been attractive to criminals because it has low start-up costs and few barriers to entry.

Comments  (0)

0a809ca78b9aa5393c0cb7dad7eb6a3a

DATA LEAKAGE a la Digital Copy Machine

May 06, 2010 Added by:David Jordan

Why spend time attempting to HACK an enterprise network when the wanted data is rolling out the door of the target facility each time a copier is replaced!

Comments  (6)

00fd6160b9db2d91e663a578d87cbaf3

Social Engineering at the White House and Your Enterprise

February 28, 2010 Added by:Wayde York

What does our enterprise information have in common with President Obama and Vice President Biden? The need for constant protection. Your enterprise data needs protection from the host of technical and human threats that seem to evolve daily. The President and Vice President require the same protection, albeit amplified due to their position in the world power scheme.

Comments  (0)

D5e39323dd0a7b8534af8a5043a05da2

So, you wanna network online too?

December 30, 2009 Added by:Fred Williams

I previously listed ways to gain valuable information on hacking targets using little work and no dumpster diving. The previous post was geared towards attacks computer systems but not human targets.What is a little more interesting is attacking specific people. This is one of the key issues behind Facebook' recent privacy issues. Never mind a user setting a "privacy filter" ...

Comments  (2)


From the Web

Verizon Business Issues 2009 Supplemental Data Breach Report Profiling 15 Most Common Attacks

December 09, 2009 from: Office of Inadequate Security

The latest in the Data Breach Investigations Report series by Verizon Business security experts provides enterprises with an unprecedented look at the 15 most common security attacks and how they typically unfold.

Comments  (0)


From the Web

Call Spoofing: So easy, even famous people do it!

October 26, 2009 from: hackyourself.net

A simple but effective call spoofing technique has hit the main stream. Former high profile Dolce & Gabbana publicist Ali Wise used a phone call spoofing service called SpoofCard to listen to her ex-boyfriend's voicemails. The service hides the phone number you're calling fro...

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »