Social Engineering

Bd07d58f0d31d48d3764821d109bf165

Why Have Email Clients Left us to Deal With Phishing?

July 07, 2014 Added by:Tripwire Inc

Helping my mom know when to be careful should not be rocket science.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Prank URL Shortening Service is Good Security Basics Reminder

June 18, 2014 Added by:Malwarebytes

Of course, it pays to be vigilant when presented with a shortening service link. While it’s a useful tool to have, there have always been issues with regards to your possible final destination.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Google Chrome Can Leave Users Vulnerable to Phishing

May 15, 2014 Added by:Anthony M. Freed

The phishing scam starts with emails that appear to have been sent by Google with “Mail Notice” or “New Lockout Notice” in the subject line.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Confessions of a LinkedIn Imposter: We Are Probably Connected

May 07, 2014 Added by:Tripwire Inc

I have a confession to make. I created a fake profile on LinkedIn and we are probably connected.

Comments  (6)

00fd6160b9db2d91e663a578d87cbaf3

Why is Guy Fawkes an Anarchist Hero?

March 23, 2014 Added by:Wayde York

Why do Anonymous hackers and other anarchists use the mask of Guy Fawkes as their symbol? George Orwell may be a better anarchist freedom for all mask than Guy Fawkes.

Comments  (2)

00fd6160b9db2d91e663a578d87cbaf3

Target Should be Our Target

March 14, 2014 Added by:Wayde York

The press has come out with the fact that Target received a warning about malware and hacking before 40 million credit cards were compromised. While we should not string up the security analysts at Target, we may have to spank their managers.

Comments  (0)

1789975b05c7c71e14278df690cabf26

5 Solid Ways to Build Security Culture in Your Organization (That You Probably Never Heard Of)

January 22, 2014 Added by:Pete Herzog

Teach employees not to say no. This and 4 other unconventional tricks will build or enhance your organization's security culture.

Comments  (2)

54b393d8c5ad38d03c46d060fa365773

Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Insider Steals Data of 2 Million Vodafone Germany Customers

September 12, 2013 Added by:Mike Lennon

Vodafone Germany said an attacker with insider knowledge had stolen the personal data of two million of its customers from a server located in Germany.

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

Gaining a Data Security Edge with Social Threat Detection

August 16, 2013 Added by:Vince Schiavone

From weak data protection practices to sophisticated organized attacks, enterprises are facing a multi-front war when it comes to protecting and preserving their information and intellectual property.

Comments  (0)

F66c1a87a8db2cb584b4e06e93a84ce3

“SIGINT” on 802.11b/g/n Distributed SDR Station - Deployment Example

August 15, 2013 Added by:Mikko Jakonen

“SIGINT” on 802.11b/g/n distributed SDR station - deployment example is overview of using SDR (Software Defined Radio) receiver system deployment to capture 802.11b/g/n “traffic”, signals on frequency range 2412- 2484 MHz.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Terrorism – See Something, Say Something

August 08, 2013 Added by:Jon Stout

he existing cyber security computing model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, etc., is no longer adequate to help organizations mitigate cyber-security risk.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security Failures: Value of the Human Firewall

August 07, 2013 Added by:Jon Stout

The computing security model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, system event monitoring, VPNs, etc., is failing to detect and block the most advanced malware. That is serious enough. But what’s worse is that this traditional defense model is of little use in preventing what many experts feel is the greatest threat to cyber security: human e...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Social Engineering – A True Case Study

August 01, 2013 Added by:Jon Stout

There are powerful integrated security dashboards that can be installed and modified to meet each user’s particular needs. Now a company can create hundreds if not thousands of employee cyber warriors with a relatively small investment.

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

Protecting the Enterprise Against Growing Social Threats

July 29, 2013 Added by:Vince Schiavone

Corporations looking to proactively protect the business against growing enterprise social risks are engaging advanced, strategic solutions to unveil and track a wide array of social threats. This delivers strategic intelligence for proactive response to effectively mitigate these threats, often before they explode into all out crises.

Comments  (4)

F66c1a87a8db2cb584b4e06e93a84ce3

Unfolding ‘DOUBLE TWINS’ Deception Scheme

July 29, 2013 Added by:Mikko Jakonen

‘DOUBLE TWINS‘ is deception scheme combining modern world speed, easiness to run anonymous with Internet and difficulties with real corporate and personal identity verification. What makes it most interesting; it was ‘quick in – quick out’ – job, completed within 3 weeks from the start.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »