Items Tagged with "Social Engineering"


69dafe8b58066478aea48f3d0f384820

DHS: Natural Disasters Fostering Social Engineering

August 25, 2011 Added by:Headlines

The DHS's National Cybersecurity and Communications Integration Center (NCCIC) is warning that malicious users may seek to exploit interest related to physical events such as earthquakes and hurricanes by generating phishing emails with subject lines related to the incidents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Releases User Security Guide

August 19, 2011 Added by:Headlines

The guide offers some fairly good advice and illustrative graphics on how to spot common scams and other mischief. It is written in simple enough terms that you, your kids, and your grandparents can all increase your Facebook security outlook a great deal in a matter of only a few minutes...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Myth: Apple Products Don’t Get Viruses

August 16, 2011 Added by:Robert Siciliano

The growing popularity of Apple products has inspired cybercriminals to create viruses that will harm Macs. Until now, Macs have been immune to these threats, but McAfee Labs is seeing the very first wave of fake programs targeted at Mac users...

Comments  (3)

3e35900ae6facc6c146a85c435c71d82

Ghost in the Wires: The World's Most Wanted Hacker

August 11, 2011 Added by:Ben Rothke

The myth of Kevin Mitnick still haunts many people. But the myth is all we’ve had till now. This memoir gives us finally the man, whose adventures as the worlds most wanted hacker, bring us to a very human view of the intersection of technology, business, law and security...

Comments  (2)

37d5f81e2277051bc17116221040d51c

What To Do If Your Gmail Account Has Been Hacked

July 21, 2011 Added by:Robert Siciliano

Once Kate went through this process, she regained control of her account within minutes. But the criminal had deleted every single email, leaving her with nothing. He’s probably going through those messages now, searching for any useful personal information...

Comments  (6)

F29746c6cb299c1755e4087e6126a816

Not All Free Identity Theft Services are Created Equal

July 20, 2011 Added by:Kelly Colgan

In order to sign up for identity theft protection services, you have to hand over a lot of vital data about yourself. Do you really want to give this to a company you’ve never done business with before—especially one that’s offering you something for free?

Comments  (0)

37d5f81e2277051bc17116221040d51c

Spear Phishing Leaves a Bloody Wound

July 19, 2011 Added by:Robert Siciliano

Once criminal hackers get a person’s username and email address, they can begin to launch a targeted spear phish scam. Scammers copy the design of each breached entities outgoing email campaign and blast the breached list with “account update” or other ruses...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Cyber Criminals Just Came A Callin’ At My House

July 17, 2011 Added by:Rebecca Herold

When I asked him why he called me in particular, he tried to avoid the question. I persisted. Finally I asked him if Microsoft had contracted his company to call me. He then said, “Yes! My company was subcontracted by Microsoft to call me, and that is how I got your information...”

Comments  (21)

7fef78c47060974e0b8392e305f0daf0

Faux Security: BlackBerg Security and Shades of Project Viglio

July 13, 2011 Added by:Infosec Island Admin

Personally, I had never heard of Joe Black until he started tweeting his craziness. Over time though, he just progressively got crazier and crazier with comments and challenges to the likes of LulzSec, who then allegedly hacked him and showed him just how poor his site security was...

Comments  (34)

69dafe8b58066478aea48f3d0f384820

Over 140,000 Children Victims of Identity Fraud Yearly

July 13, 2011 Added by:Headlines

"Child identity fraud poses complex challenges to consumers, businesses and regulators. Unfortunately, minors' identities are particularly appealing to fraudsters because their personal data is untainted, legitimate and less likely to be monitored for misuse..."

Comments  (0)

6648b1abd4a9b964566c3690613f20a6

Case Study: Advance Fee Scams

July 12, 2011 Added by:Mark Baldwin

I am sure you all have received an email purportedly from a wealthy person overseas who needs your help transferring money. The reasons vary, but they always promise a large sum in return for help. Recently I received the following email that was an attempt at advance fee fraud...

Comments  (3)

3e35900ae6facc6c146a85c435c71d82

Lessons from LIGATT

July 10, 2011 Added by:Ben Rothke

It is the common opinion of industry experts that Evans and his company have little real knowledge beyond pedestrian hacking techniques found in plagiarized books and beginner hacking texts. LIGATT offers products that are simply bloated version of common tools such as ping and nmap...

Comments  (7)

16443e0c6f6e4a400fd0164b3c406170

When a "Phish" is Really Fishy

June 30, 2011 Added by:Christopher Burgess

Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity. Recently, one slipped through my filters. I've taken the liberty to identify each item within this phish, which seems fishy...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Curious Case of the FBI Deputy Attache on LinkedIn

June 22, 2011 Added by:Infosec Island Admin

Is this a cut out account for someone looking to garner access to others with information they desire? This is the same type of action that Anna Chapman was undertaking with some of her compatriots for the SVR while living in the United States: Gathering intelligence via LinkedIn...

Comments  (0)

7c5c876d1933023ac375eead04302e1a

Attackers Love Your Organization's HR Department

June 19, 2011 Added by:Boris Sverdlik

Companies use every available resource in their recruiting. They hire third party recruiters, post job listings on LinkedIn, Dice, Monster and numerous other places. While this will bring in a plethora of qualified candidates, it also provides attackers a wealth of information...

Comments  (9)

44fa7dab2a22dc03b6a1de4a35b7834a

Top 10 Threats to Security and Privacy for Business

June 10, 2011 Added by:Bill Gerneglia

It is difficult to remain 100% confident in your organizations security policies and procedures, but we must remain 100% committed to diligence in constant upgrades and feedback from attempted breaches to our networks and systems...

Comments  (0)

Page « < 5 - 6 - 7 - 8 - 9 > »