Items Tagged with "Social Engineering"


37d5f81e2277051bc17116221040d51c

Beware of PC Remote Access Assistance Scams

March 11, 2011 Added by:Robert Siciliano

Criminals almost duped a man into handing over remote access to his computer, along with all his personal and financial information. The so-called technician started by telling the man his computer had sent an error message to Microsoft and he was calling to help him rectify the problem...

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

How to Avoid Falling For Social Engineering Attacks

March 11, 2011 Added by:Brent Huston

You have to be sharp to see through a social engineering attack. The challenge is to retain that sharpness while in the midst of multiple tasks. Most of the time, the attacker will take advantage of a busy receptionist, a chaotic office, or tired staff when they try their dastardly deed...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Identity Theft Tops FTC Consumer Compliant List

March 09, 2011 Added by:Headlines

The list showed that for the 11th year in a row, identity theft was the number one consumer complaint category. For the first time, “imposter scams” – where imposters posed as friends, family, respected companies or government agencies to get consumers to send them money – made the top 10...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Research Roundup: Cisco’s Annual Report 2010

March 08, 2011 Added by:Mike Meikle

Social Engineering or Trust Exploitation is most effective tool for cyber-criminals. Whether it is through Facebook, Twitter, LinkedIn or via an infected URL, Social Engineering is the key vector in gaining access to privileged information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attackers Utilize Emerging Technologies

March 01, 2011 Added by:Headlines

"Attackers know the limits of traditional security solutions, but they are also very good at taking advantage of emerging technologies and new vectors for attack. Standalone user applications, social engineering attacks, and the move to HTTPS all have the potential to introduce new threats"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Energy Companies Hit by Chinese "Night Dragon" Attacks

February 10, 2011 Added by:Headlines

"Targeted attacks such as Night Dragon, orchestrated by a growing group of malicious attackers committed to their targets, are rapidly on the rise. These targets have now moved beyond the defense industrial base, government, and military computers to include global corporate and commercial targets..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Can Pinpoint Identity by Analyzing Usernames

February 08, 2011 Added by:Headlines

The researchers produced a tool that uses statistical analysis to calculate the relative uniqueness of any given username. The team can now distinguish a single user about half of the time by analyzing multiple usernames without using other key data such as location or date of birth...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Plagued By Two New Security Exploits

February 02, 2011 Added by:Headlines

The exploits are a Trojan called Asprox.N and a malicious link attack called Lolbot.Q. Both play on the probability that targets will go to unusual lengths to regain access to their coveted Facebook accounts without stopping to question the nature of the instructions they have received...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Spies May Have Spear-fished U.S. Diplomats

February 02, 2011 Added by:Headlines

A series of emails were sent to five State Department officials who were engaged in sensitive negotiations with the Chinese government on greenhouse-gas emissions, and contained attachments infested with malware that would have allowed the attackers access to the recipient's computers...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Good Reasons to Secure Your Facebook Profile

January 25, 2011 Added by:Theresa Payton

Make sure you have a strong password on your accounts, and Review your Facebook profile to see how much information you share about yourself that could be used to impersonate you - high school attended, pet's name, favorite color, etc...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Insider Threats: Big Enough to be Parodied on The Simpsons

January 25, 2011 Added by:Headlines

If you have been parodied on the long running prime-time animated series The Simpsons, you can rest assured that you have finally arrived. The most recent member of the coveted Simpson parody club is, believe it or not, none other than the Insider Threat...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Five Antivirus Programs for 2011

January 05, 2011 Added by:Headlines

Malware is consistently listed as one of the most serious threats to consumer and enterprise security. The results of this independent comparison conducted by security professionals provides those in the market for antivirus software a great starting point for making your selection...

Comments  (1)

37d5f81e2277051bc17116221040d51c

The Twelve Scams of Christmas and Other Attacks

December 24, 2010 Added by:Robert Siciliano

Identity Thieves and Cybercriminals Take Advantage of the Holiday Season, Aiming to Steal Consumers’ Money, Identities and Financial Information. As cybercriminals begin to take advantage of the holiday season, be cautious....

Comments  (0)

37d5f81e2277051bc17116221040d51c

Top Five Vishing Techniques

December 17, 2010 Added by:Robert Siciliano

The name comes from “voice,” and “phishing,” which is, of course, the use of spoofed emails designed to trick targets into clicking malicious links. Instead of email, vishing generally relies on automated phone calls, which instruct targets to provide account numbers...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Spear Phishers Know Your Name

November 27, 2010 Added by:Robert Siciliano

When phishing attacks are directed at company officers or senior executives, it’s called whaling, appropriately enough. I don’t know who sits around and coins this stuff but it makes analogical sense. Spear phishers target their victims in a number of ways...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Phishing Scammers Getting a Jump on Tax Season

November 22, 2010 Added by:Headlines

Recent alerts concern emails purported to be sent from the Electronic Funds Transfer Payment System which inform the recipient that there is a problem with their tax payments. The email contains a link to a spoofed website that contains malicious malware that will infect the visitor's computer...

Comments  (0)

Page « < 7 - 8 - 9 - 10 - 11 > »