Social Engineering

Bd07d58f0d31d48d3764821d109bf165

Hacker Myths Debunked

October 20, 2014 Added by:Tripwire Inc

Ethical hacking can improve the security of various products, whereas malicious hacking seeks to undermine data integrity. It’s how people hack which shapes the nature of a particular incident.

Comments  (0)

Default-avatar

iWorm The First OSX Bot To Use Reddit For CnC: Expect Mac malware to surge

October 07, 2014 Added by:Cyphort

Nowadays, as half of newly issued computers in the enterprise are Macs, OSX malware is also becoming more prevalent.

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

Computer Security is Your Own Responsibility

September 24, 2014 Added by:Brent Huston

The biggest part of computer security is just mundane, common sense stuff.

Comments  (0)

93c815429fc1ab15a9295a4f55989ae0

A Tale of Two Professionals

September 09, 2014 Added by:Neohapsis

Due to the disclosure of their phone numbers coupled with the power of Google and other search engines, the potential for extortion by a random individual who is now in possession of compromising photos is also a reality.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Are Connected Cars on a Collision Course with Network Security?

August 26, 2014 Added by:Patrick Oliver Graf

Flipping through any consumer publication that rates vehicles, you’ll see all the metrics you would expect – from safety and performance (acceleration, braking, etc.) to comfort, convenience and fuel economy. What you won’t find is an assessment of the car’s risk of being remotely hacked.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Facebook “Enter Details Here to Enable Your Account”

July 30, 2014 Added by:Malwarebytes

Here’s one in-the-wild phishing campaign that we spotted homing in on users.

Comments  (0)

F5b1211c3952ce30f829cd3c757a1a7f

Cyphort Detects Surge in Ad Network Infections, a.k.a. “Malvertising”

July 24, 2014 Added by:Ali Golshan

We recently noticed a surge where exploit packs are served from DMO (Destination Marketing Organization) websites using an Ad network called simpleviewinc.com during the July 4th long weekend.

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Crypto Locker Down, But NOT Out

July 23, 2014 Added by:Brent Huston

Even as the govt was touting their takedown, threat intelligence companies around the world (including MSI), were already noticing that the attackers were mutating, adapting and re-building a new platform to continue their attacks.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Why Have Email Clients Left us to Deal With Phishing?

July 07, 2014 Added by:Tripwire Inc

Helping my mom know when to be careful should not be rocket science.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Prank URL Shortening Service is Good Security Basics Reminder

June 18, 2014 Added by:Malwarebytes

Of course, it pays to be vigilant when presented with a shortening service link. While it’s a useful tool to have, there have always been issues with regards to your possible final destination.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Google Chrome Can Leave Users Vulnerable to Phishing

May 15, 2014 Added by:Anthony M. Freed

The phishing scam starts with emails that appear to have been sent by Google with “Mail Notice” or “New Lockout Notice” in the subject line.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Confessions of a LinkedIn Imposter: We Are Probably Connected

May 07, 2014 Added by:Tripwire Inc

I have a confession to make. I created a fake profile on LinkedIn and we are probably connected.

Comments  (6)

00fd6160b9db2d91e663a578d87cbaf3

Why is Guy Fawkes an Anarchist Hero?

March 23, 2014 Added by:Wayde York

Why do Anonymous hackers and other anarchists use the mask of Guy Fawkes as their symbol? George Orwell may be a better anarchist freedom for all mask than Guy Fawkes.

Comments  (2)

00fd6160b9db2d91e663a578d87cbaf3

Target Should be Our Target

March 14, 2014 Added by:Wayde York

The press has come out with the fact that Target received a warning about malware and hacking before 40 million credit cards were compromised. While we should not string up the security analysts at Target, we may have to spank their managers.

Comments  (0)

1789975b05c7c71e14278df690cabf26

5 Solid Ways to Build Security Culture in Your Organization (That You Probably Never Heard Of)

January 22, 2014 Added by:Pete Herzog

Teach employees not to say no. This and 4 other unconventional tricks will build or enhance your organization's security culture.

Comments  (2)

54b393d8c5ad38d03c46d060fa365773

Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »