social engineering

RSS

social engineering News

  • Researchers reveal how easy it is to fall victim to social engineering

    Posted March 14, 2013 - 10:52 am

    Receiving an email to connect to someone on LinkedIn turned out to be a social engineering experiment that Trend Micro's global field enablement vice president, Blake Sutherland, will never forget.
  • Security fail: weak passwords, strong crackers, social engineering

    Posted August 22, 2012 - 10:57 am

    Every week seems to bring a new warning about another hacked site exposing at least a million passwords. Is security possible anymore?
  • Your ultimate guide to social engineering

    Posted February 28, 2012 - 2:10 pm

    Social engineering attacks security at its weakest link: People. Preying on employees' best intentions, social engineers gain unauthorized access to systems and information.
  • Social engineering: My career as a professional bank robber

    Posted October 26, 2011 - 2:45 pm

    Jim Stickley got his first computer at age 12, and he was chatting with other computer "nerds" on bulletin board sites by the time he was 16. A wannabe hacker, Stickley said his first foray into playing the system was with free codes -- codes that would exclude his phone and computer time from racking up charges that would incur the wrath of his parents.
  • New social engineering poll reveals which scam works better

    Posted October 17, 2011 - 2:35 pm

    Which tactic works best for a scamming social engineer? Acting like an authority figure and requiring a victim to answer questions and give up sensitive information? Or acting like a nice, trustworthy person who strikes up a friendly conversation and just needs the victim to tell them a few things to help them out?
  • Open this malware or I'll sue you

    Posted September 21, 2011 - 3:31 pm

    The latest social engineering trick to get victims to open malicious email attachments accuses them of being spammers and threatens to sue them if they don't stop.
  • Bigger isn't better when it comes to social engineering attacks

    Posted September 21, 2011 - 1:57 pm

    When it comes to social engineering attacks, larger companies attract more of them, and when they are victimized it costs more per incident, according to a survey sponsored by Check Point.
  • Facebook Pwn tool takes profile info, helps social engineers

    Posted September 13, 2011 - 2:28 pm

    A group of security researchers based in Egypt have created a tool that will make social engineering easier because it automates the collection of hidden Facebook profile data that is otherwise only accessible to friends in a user's network.
  • Xbox Live's Stephen 'Stepto' Toulouse's personal site hacked

    Posted April 3, 2011 - 10:45 pm

    Toulouse is Xbox Live's director of policy and enforcement and in that capacity he's responsible for banning a lot of players (for good cause). That makes him a target, and on Sunday someone got through his defenses.
  • Social engineering: 3 examples of human hacking

    Posted February 9, 2011 - 6:48 pm

    Chris Hadnagy gets paid to fool people, and he's gotten pretty good at it over the years. A co-founder of social-engineering.org and author of Social Engineering: The Art of Human Hacking, Hadnagy has been using manipulation tactics for more than a decade to show clients how criminals get inside information.
  • Man loses $20 million after taking laptop for repair

    Posted January 26, 2011 - 12:20 pm

    A New York couple have been charged with defrauding a wealthy musician to the tune of $20 million (£12.3 million) after he innocently visited their computer servicing company to have a virus removed from his laptop.
  • Social engineering attacks: Highlights from 2010

    Posted January 5, 2011 - 2:56 pm

    There were some disturbing results from a capture-the-flag-style contest held at this summer's DefCon security conference. The CTF exercise--called "How Strong Is Your Schmooze?"--was an attempt to raise awareness about social engineering, or human manipulation in order to commit a crime. It challenged contestants to attempt to breach (in an ethical and legal way) information about target companies that could be used for a hypothetical attack.
  • 5 holiday tech scams to avoid

    Posted November 24, 2010 - 4:17 pm

    The holiday shopping season is a great time to get tech products at discounted prices, but it also creates a golden opportunity for the Web's scam artists. The FBI, McAfee, the Better Business Bureau and F-Secure are all warning about cybercriminals who will try to take you for a ride this holiday season. Here are their most pertinent warnings and tips for staying safe:
  • Social engineer toolkit coming at BSidesLasVegas

    Posted July 26, 2010 - 12:26 pm

    New social engineering techniques will be on full display at this week's Black Hat and DefCon events in Las Vegas. Some have already gained media attention, including a planned social engineering contest at DefCon.
  • why executives are the easiest social engineering targets

    Posted July 14, 2010 - 12:26 pm

    Security managers are often concerned about employees who use Facebook at work and fall for the 419 "I'm trapped in London and need money" scam. Others might still have some in their organization who are convinced it is the Prince of Nigeria who wants to share his fortune. And with spear phishing, a targeted email attack in which messages are created to look like they come from an employer, bank or other trusted source, now a common criminal technique, the need for effective awareness programs for employees has become paramount. But those concerns, according to Jayson Street, a security consultant and CIO of Stratagem 1 Solutions, shouldn't be the chief worry. That's because the biggest social engineering threat is the top executives in a company -- and they're the ones who need to be educated the most.
  • Five Things You Need to Know About Social Engineering

    Posted December 16, 2009 - 1:55 pm

    Today's criminals are having a heyday using e-mail and social networks to trick people into giving up sensitive information.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question
randomness