Social Engineering

Bd86d2b4bd72ac0ca847696eec3759f3

Five Ways BYOD can Harm your Company

October 02, 2012 Added by:Michelle Drolet

It’s becoming more and more common for workers to store work-related documents on devices they bring to and from work each day. While this can be convenient--employees can access important documents at home or on the road--it also creates greater security risks for businesses...

Comments  (0)

E6fba550184963cb20ac46502a1fa1ee

Social Engineering: What the Heck Was I Doing? Part 1

September 26, 2012 Added by:Will Tarkington

The method I used for this particular tactic was to monitor the conversational rhythm. Then inject into it and take it over allowing me to guide the conversation. The skill set that allows you to walk into a conversation and take it over can’t be understated...

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Insights from Top CSOs: 100 Percent Concerned About Spear-Phishing

September 18, 2012 Added by:Jason Clark

Today’s phishing attacks are slow-and-low for evasion, highly targeted and look legitimate. Malware is increasingly delivered via an embedded URL which might not be live until days after the email is sent. Many of the CSOs also received variants of spear-phishing via SMS during the meeting...

Comments  (18)

03b2ceb73723f8b53cd533e4fba898ee

2012 Norton Cybercrime Report Presents a Worrisome Scenario

September 06, 2012 Added by:Pierluigi Paganini

With 556 million of victims per year, 2 of 3 adults have been victims of online crime in their lifetime, with a total economic loss of 110 Billion and an average cost per victim of $197. The trend demonstrates the need to put in place a massive awareness campaign...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Four Defendants Charged in Credit Card Skimming Scheme

August 21, 2012 Added by:Headlines

Four men were arrested for their roles in an identity theft scheme involving the theft of credit card numbers used to fraudulently purchase fuel at gas stations in order to be sold, distributed, or otherwise used by the defendants in order to obtain criminal proceeds...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Open Source Security Tools You Could Be Using

August 17, 2012

Jeff Bardin, a Principal at Treadstone 71 LLC, shared a variety of open source tools that businesses and consumers can use can for “espionage, competitive intelligence, and intellectual property” purposes. Check out this video to find out more about these tools and what they can do...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Student Pleads Guilty to Counterfeiting Coupons on the Internet

August 07, 2012 Added by:Headlines

In addition to creating and disseminating fake coupons, Henderson also wrote tutorials and created templates he posted online and that provided instructions for creating counterfeit coupons using their own computers. Henderson’s scheme caused retailers and manufacturers to lose approximately $900,000....

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Facebook, the Poisoned Network: 83 Million Questionable Profiles

August 03, 2012 Added by:Pierluigi Paganini

There are bots creating a significant number of fake profiles, which are managed by machines capable of interacting with each other and with real users, thus changing the "sentiment" and "conversation" on a large-scale, as well as altering the social graph to preclude meaningful correlations of data...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Psychopathy Tweets: Too Many Statistics, Not Enough Proof of Concept

August 01, 2012 Added by:Infosec Island Admin

What I came out with, after many slides of numbers, was “nope not really”, which I pretty much had thought before. There are just too many variables to this type of venture and you would need to have a trained psychoanalyst to talk to the individual to determine whether or not they are a true psychopath...

Comments  (1)

4777ea0d573c51027a097399006f228a

On Trolling and Obsessions...

July 31, 2012 Added by:ʞɔopuooq ʇuıɐs

I have done my best to ignore rantings, trying not to feed the trolls, but Emick recently upped her campaign against me and created a blog post berating my methods. One of my valued supporters, @render64, has read Emick's blog and kindly used intelligent analysis in order to expose what’s really going on here...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Detecting Psychopathy via Tweets? A Flawed Premise...

July 25, 2012 Added by:Infosec Island Admin

It seems to me that more and more we are being collectively mined not only for our habits, but now our emotions as well as our psychological makeups. All of this could potentially be collated from numerous sources. I doubt we will ever be able to contextualize the human psyche just from internet datum…

Comments  (2)

69dafe8b58066478aea48f3d0f384820

FBI: More Arrests in International Cyber Crime Takedown

July 13, 2012 Added by:Headlines

"The FBI announced three more arrests arising from Operation Card Shop, an international operation aimed at sophisticated, highly organized cyber criminals involved in buying and selling stolen identities, exploited credit cards, counterfeit documents, and sophisticated hacking tools..."

Comments  (0)

4777ea0d573c51027a097399006f228a

Updates: Rumors of Anonymous Hacking th3j35t3r's Accounts Overblown

July 11, 2012 Added by:ʞɔopuooq ʇuıɐs

About the twitter ‘takeover’. I have to say that was clever. Even though my account wasn’t actually breached per se. The folks behind this latest attempt found an auto-RSS/Email to tweet script that uses the Twitter API and worked out a way to post to my account without actually having any physical access. Kudos...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Wanna Buy Some Dumps?

July 07, 2012 Added by:Robert Siciliano

“Dumps” are batches of stolen credit card numbers. This example of a criminal’s sales pitch for stolen dumps came to me through a comment on a blog post I wrote about credit card security. Go figure. If you scan the following message line by line, you’ll see there’s a great deal of thought put into the pitch...

Comments  (6)

69dafe8b58066478aea48f3d0f384820

Georgia Man Convicted for Role in Phishing Operation

July 03, 2012 Added by:Headlines

Osarhieme Uyi Obaygbona, 32, of Atlanta, Georgia, was convicted last week of conspiracy to commit wire fraud, conspiracy to commit identity theft, and conspiracy to gain unauthorized access to protected computers. Phishing attacks use fraudulent web pages that mimic the legitimate web pages...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Request for Information: Social Engineering Using Social Media

June 25, 2012 Added by:Joel Harding

We’ve been saying for years that the human element is the weakest link in cybersecurity. Kevin Mitnick (out of prison now and doing well) was an extremely talented hacker but what set him apart was his research into potential victims and then having the audacity to social engineer them...

Comments  (1)

Page « < 2 - 3 - 4 - 5 - 6 > »
Most Liked