Social Engineering

F29746c6cb299c1755e4087e6126a816

Identity Thieves Take a Bite Out of Apple

January 15, 2013 Added by:Kelly Colgan

Scammers are taking advantage of a product financing offer that presents identity thieves with the opportunity to fraudulently obtain instant credit approval to make online purchases. The crime is simple to carry out. All scammers need are the basic types of information commonly exposed in data breaches...

Comments  (1)

65be44ae7088566069cc3bef454174a7

Are You Faking It?

January 06, 2013 Added by:Rebecca Herold

A few weeks ago I got a text message from a phone number I didn’t recognize, with a rather odd message. I sent a text back asking, “Who do U think U sent ur txt 2?” The response, “Myrtle!” I’m not Myrtle. Turns out they were using a phone number they had found online that was associated for the Myrtle they knew.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Turkey – Another story on use of fraudulent digital certificates

January 04, 2013 Added by:Pierluigi Paganini

It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s web properties. Using the certificate it is possible to spoof content in a classic phishing schema or perform a man-in-the-middle attack according Google Chrome Security Team and Microsoft experts.

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Fraud Files: Pay Later, Pilfer Now

December 18, 2012 Added by:Kelly Colgan

Services such as BillMeLater, a PayPal company that allows customers to make purchases on credit after a simple sign-up process and credit check, have created an identity theft trend and left victims fighting to clear their names...

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

Do Better Technical Controls Increase People Focused Attacks?

December 16, 2012 Added by:Simon Moffatt

Social engineering can be seen as a more direct approach to exposing real security assets such as passwords, processes, keys and so on. Via subtle manipulation, carefully planned framing and scenario attacks, through to friending and spear phishing, people are increasingly becoming the main target...

Comments  (0)

E6fba550184963cb20ac46502a1fa1ee

Reflected Glory: Revealing one of my self-created social engineering tricks

December 11, 2012 Added by:Will Tarkington

What is reflected glory? To do this trick you need someone with a high social status that you can be associated with. It doesn’t have to be a close association just one that is known. You then simply state with authority your own opinion once the relationship has been recently established...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Why I'm Upset About the S.C. Department of Revenue Breach

December 04, 2012 Added by:Kelly Colgan

I’m a South Carolina taxpayer, and therefore, a potential victim of the massive South Carolina Department of Revenue Breach. I work in the identity theft and data risk industry, so when I heard about how everything was being handled and what was being offered, I was upset...

Comments  (2)

4ed54e31491e9fa2405e4714670ae31f

Weaponizing the Nokia N900 – Part 4.0 – A Three Year Anniversary!

November 25, 2012 Added by:Kyle Young

I still believe the best phone for hackers is the Nokia N900 and it is a shame that Nokia decided to go the way of Microsoft. I personally believe that Nokia should have gone the route of an Android/Linux hybrid mobile operating system, but that’s just my opinion...

Comments  (6)

48062676f7b2fc521b0b32a3c6494469

Money Laundering Scenes In -The Digital World

November 20, 2012 Added by:gaToMaLo r. amores

By denying terrorist and criminals groups access to their money, authorities can stop them buying munitions and paying for suicide bombers. This approach has been highly successful in identifying and dismantling terrorist networks. Now they need to adapt and learn how this new DC works because it cannot be stopped...

Comments  (1)

E6fba550184963cb20ac46502a1fa1ee

The Female Social Lever

November 16, 2012 Added by:Will Tarkington

In my ongoing expose on Social Engineering techniques I bring to you one of my favorites I call “The Female Social Lever.” A technique that takes advantage of social geometry and complex female group hierarchy. For this example we are going to use a party because it is where I developed this particular technique...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

False Flag Phishing

November 15, 2012 Added by:Alan Woodward

There is a form of phishing becoming more common on Twitter that is likely to fool even the most suspicious of users. I very nearly fell for it myself. What stopped me? Unlike me, the person who purportedly sent me the message doesn’t make the sort of spelling mistakes that were in the message...

Comments  (0)

888605c6c25c19e41bbbb986ea6d43c1

You Believe It Because "I" Wrote It

November 14, 2012 Added by:Jim Palazzolo

Besides sheer entertainment, my objective is to practice my ability to create deception. It has been my observation that security personnel must be able to spot deception. Whether it’s covert channels or fake ID’s, deception is a very powerful tool that can be used both offensively and defensive...

Comments  (0)

E6fba550184963cb20ac46502a1fa1ee

I lost my theory of mind… or Where my mind at?

November 13, 2012 Added by:Will Tarkington

Without the theory of mind everything that social engineers do or attempt to do would fail. The theory of mind is basically one’s ability to differentiate perspectives. From perspective comes intention, from intention comes reaction, and from reaction comes reward (or failure)...

Comments  (1)

F66c1a87a8db2cb584b4e06e93a84ce3

Why traditional approaches for securing Industrial Control Systems Fail

November 09, 2012 Added by:Mikko Jakonen

Criminals or 'adversaries' do not care about your papers. Period. Only a skilled set of controls, wisdom, and discipline in management secures the environment. Attackers will utilize every means to gain access your beloved environment...

Comments  (2)

1789975b05c7c71e14278df690cabf26

Six Sneaky Ways to Bring Down Your Company

November 08, 2012 Added by:Pete Herzog

This article will give you some ideas on how you can quickly put yourself out of a job using the Internet. If you're careful and a little lucky, you won't end up in jail either! At the very least, this article shows how doing things that are good for an office may not necessarily be good for the security of your company...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Russian Underground is just part of a global criminal network

November 01, 2012 Added by:Pierluigi Paganini

Programming services and software sales was the most common service in the criminal market, where it is possible to buy customized malware agents and any kind of applications to conduct a cyber attack such as spammers, brute-force tools and DDoS bots and exploit toolkits...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »
Most Liked