Items Tagged with "Social Engineering"


Fake Security Firms Will Be Exposed

June 09, 2011 Added by:Boris Sverdlik

Joe Black has built a reputation around certifications and misinformation. He has a very interesting career, that we can trace back to his days at Wright Printing in 2005 according to his LinkedIn Profile which is also about the time he was supposedly enrolled at ITT...

Comments  (9)


Five Reasons Why Your Workplace Blocks Facebook

June 07, 2011 Added by:Global Knowledge

Don’t you just love Facebook? Whether it’s adding new members to Mafia Wars, finding new busboys for Café World, or cyberstalking your ex-girlfriend’s new boyfriend, Facebook has endless options to keep you entertained. If only you could logon at work, then your life would be complete...

Comments  (0)


Social Engineering Gains Ever More Credibility

May 24, 2011 Added by:PCI Guru

At the end of the day, everything in an organization’s security posture comes down to the people who interact with the information you are trying to protect. It only takes one person having a bad day to make all of an organization’s security technology and other controls impotent...

Comments  (0)


Research Reveals Widespread Vulnerability to Phishing

May 24, 2011 Added by:Headlines

Small and medium-sized organizations have become the primary targets of the Eastern European hacker gangs behind this frightening new crime wave. These cybercriminals tend to prey on smaller businesses and banks that lack the cyber-fraud controls many larger institutions have in place...

Comments  (0)


Top Five Business Security Risks

May 17, 2011 Added by:Robert Siciliano

At 2010’s Defcon, a game was played in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blurted out sensitive information...

Comments  (0)


The PrimorisEra Affair: Social Networking and SECOPS

April 29, 2011 Added by:Infosec Island Admin

Never mind if you work in a job that requires security, everyone should be cognizant when they are online talking to someone that they do not know in real life. From the common data thief to the corporate spy, we all may have data that someone wants and is willing to lie to get it...

Comments  (0)


New Update: The Social-Engineer Toolkit v1.3.5

April 25, 2011 Added by:Headlines

The Social Engineering Toolkit is a python-driven suite of custom tools which focuses on attacking the human element in penetration testing. It’s purpose is to augment and simulate social-engineering attacks and allows for effectively testing how a targeted attack may succeed...

Comments  (0)


Chinese Hackers Spear-Phishing for US Military Secrets

April 23, 2011 Added by:Dan Dieterle

What could the Chinese hope to gain? Military secrets. Along with terabytes of data that have been stolen, the Chinese also obtained login credentials and blue prints to some of America’s hi-tech military equipment...

Comments  (0)


Spear-Phishing Season Is Declared Open

April 08, 2011 Added by:PCI Guru

Post-Epsilon breach, it seems every merchant under the sun is notifying their customers of the expected onslaught of electronic mail messages asking for bank account and credit card numbers among other PII. As a result, a lot of credit card numbers will likely get exposed. Be prepared...

Comments  (0)


Windows Support Scam Update

April 01, 2011 Added by:Simon Heron

This scam involves fraudsters cold calling people claiming to be a Windows support tech and getting the victim to give them remote access to their PCs in the guise of helping them ‘cleanse’ their systems – as long as the victim hands over money or in some cases much more...

Comments  (1)


Be Wary of Fake Adobe Update Scam

March 31, 2011 Added by:Headlines

"Amid reports of Adobe’s recent zero-day vulnerability, users have been urged to update to the newest version. Unfortunately, scammers are using this as an opportunity to target users," CSO's Bill Brenner said...

Comments  (0)


Ten Social Media Security Considerations

March 30, 2011 Added by:Robert Siciliano

Social media security issues involve identity theft, brand hijacking, privacy issues, online reputation management, and provides opportunities for criminals to “friend” their potential victims, creating a false sense of trust they can use against their victims through phishing or other scams...

Comments  (0)


Check Your Password Security

March 29, 2011 Added by:Robert Siciliano

Passwords are the bane of the security community. We are forced to rely on them, while knowing they’re only as secure as our operating systems, which can be compromised by spyware and malware. There are a number of common techniques used to crack passwords...

Comments  (0)


The "Lots of Sex" Risk and Security Project

March 16, 2011 Added by:Pete Herzog

Routines make us predictable which, becomes our flaw. The problem with "patching" these flaws is that they are design features which are the product of being human. In addressing those flaws we will also ruin many of the good things about people which make them creative, social, and productive...

Comments  (8)


Was a Teenage Girl Central to the HBGary Hack?

March 16, 2011 Added by:Headlines

"Kayla played a crucial role, posing as Barr to an IT administrator... to gain access to the company’s servers... [Kayla] and four other hackers broke into his company’s servers... defacing his Web site, purging data and posting more than 50,000 of his emails online for the world to see..."

Comments  (0)


Social Engineering: The Art of Human Hacking

March 16, 2011 Added by:Ben Rothke

Far too many people think that information security and data protection is simply about running tools, and too many technology books focus on the hardware and software elements, completely ignoring the human element. The social engineer can then use that gap to their advantage...

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »