Items Tagged with "Social Engineering"


B64e021126c832bb29ec9fa988155eaf

Analysis of Passwords Dumped from LinkedIn

June 11, 2012 Added by:Dan Dieterle

People put a lot of personal information on LinkedIn - their education and job experience, along with the groups that they belong to - treasure trove of information to Social Engineers. Of all the online social sites, LinkedIn users should really choose a long complex password to secure their account...

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

LinkedIn Breach Part II: What You Need to Prepare for Next

June 09, 2012 Added by:Jason Clark

The LinkedIn breach made headlines, but I want to go deeper and provide practical advice for organizations on how they can anticipate DLP consequences and tighten network security. You need a strategy to protect against attack scenarios. Here’s a seven-step check list for mitigating your risk...

Comments  (4)

54b393d8c5ad38d03c46d060fa365773

How and Why to Alert Your Employees of the LinkedIn Breach

June 07, 2012 Added by:Jason Clark

Cyber security teams should send out an employee alert explaining why LinkedIn passwords need to be changed and best practices for doing so. You may not have direct IT control over individual LinkedIn accounts, but your communication may alleviate social engineering attacks on employees and your network...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Should You Be Worried About the LinkedIn Breach?

June 06, 2012 Added by:Kelly Colgan

People who rely on LinkedIn for professional networking keep a wealth of information stored on their profile pages. With news of a possible data breach exposing 6.5 million user passwords, LinkedIn users need to take steps to protect their personal data. Here are five tips we recommend you follow...

Comments  (3)

3e35900ae6facc6c146a85c435c71d82

Social Engineering: A True Story of Incredible Deception

May 31, 2012 Added by:Ben Rothke

In the vernacular of infosec, Tania Head was a type of social engineer. In the book Social Engineering: The Art of Human Hacking, Christopher Hadnagy details how attackers use social engineering to manipulate people into performing actions or divulging information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Malware Targeting Facebook, Gmail and Yahoo Users

May 16, 2012 Added by:Headlines

"We've recently discovered a series of attacks being carried out by a P2P variant of the Zeus platform against some of the internet’s leading online services... The attacks are targeting users of Facebook, Google Mail, Hotmail and Yahoo – offering rebates and new security measures..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Skype Malware Campaign Spreading Poison Ivy Trojan

May 16, 2012 Added by:Headlines

Malware researcher Dancho Danchev is reporting a widespread social engineering campaign on Skype that is spreading a variant of the Poison Ivy Trojan. Less than half of the 42 commercial antivirus solutions surveyed are able to detect the Trojan's signature...

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

It's Summer Blockbuster Season Again - Time to get Prepared

May 08, 2012 Added by:Lee Munson

One of the most used tricks that black hat hackers use during this time of year is to piggyback off of the advertising of big budget movies. There are a lot of ways that you can leverage attacks with this type of advertising and believe me they use all of them...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Busting the Ten Biggest Computer Security Myths

May 08, 2012 Added by:Headlines

While some of the myths addressed may seem to be common sense issues, they also represent widespread misconceptions that continue to be pervasive in the information technology world today, so a reminder that these notions are bunk seems in order...

Comments  (1)

71d85bb5d111973cb65dfee3d2a7e6c9

Phishing with PDF's and Why it Works

May 02, 2012 Added by:f8lerror

During many penetration tests the need to social engineer a target may be required. Let’s talk about something that completely relies on the user being conned into following the attackers instructions. The scenario is simple send the user a PDF form and have them submit the form...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

Five Steps to a Successful Social Attack

April 29, 2012 Added by:Neira Jones

You might not fall for these attacks, but how many members of your family would? How many employees in your organization would, from field staff to C-level execs? Different people will have different thresholds to these attacks. Security education and awareness is key...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Social Media Security 101

April 24, 2012 Added by:Joel Harding

EVERYTHING is compromised. Every web site, every data base, every place that touches the web – I assume this at all times. There is not one among us whose network has not been compromised. The security mantra in the past was “Risk Avoidance”. That is no longer the case...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Social Engineering and SCADA Security

April 24, 2012 Added by:Infosec Island Admin

Social engineering attempts can be highly targeted and conducted in a way that is much more difficult to detect than the spam and phishing emails we receive in our inbox. Phone-based social engineering attempts were recently experienced at two or more power distribution companies...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Fake LinkedIn Notifications Serving Up Malware

April 20, 2012 Added by:Headlines

Researchers are reporting bogus LinkedIn notifications that lead users to malware. The spoofed notifications look legitimate, sporting the LinkedIn logo and a format familiar to members of the business networking platform, making the operation difficult to detect...

Comments  (0)

E973b16363b3de77b360563237df7e32

Observations on Lack of Research in Social Engineering

April 19, 2012 Added by:Bozidar Spirovski

The attack was performed by multiple phone calls which created contact with multiple targets. Each call was a probing attempt to collect as much information possible. The first and second stage of the attack was aimed at the same targets but with several days delay between stages...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Four Tips for Teaching Your Staff About Social Engineering

April 11, 2012 Added by:Brent Huston

Social engineering, the process of obtaining confidential information through tricking people to do things they should not do; is on the rise. So how can you help your staff recognize social engineering before it’s too late? Here are a few tips...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »