Social Engineering

1789975b05c7c71e14278df690cabf26

Six Sneaky Ways to Bring Down Your Company

November 08, 2012 Added by:Pete Herzog

This article will give you some ideas on how you can quickly put yourself out of a job using the Internet. If you're careful and a little lucky, you won't end up in jail either! At the very least, this article shows how doing things that are good for an office may not necessarily be good for the security of your company...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Russian Underground is just part of a global criminal network

November 01, 2012 Added by:Pierluigi Paganini

Programming services and software sales was the most common service in the criminal market, where it is possible to buy customized malware agents and any kind of applications to conduct a cyber attack such as spammers, brute-force tools and DDoS bots and exploit toolkits...

Comments  (0)

71d85bb5d111973cb65dfee3d2a7e6c9

Getting System the Lazy Way

October 31, 2012 Added by:f8lerror

We know all that many users are local administrators. We also know we can send or drop binaries to these users and they will run whatever we want them to. The problem lies in when they run the binary if they don’t run it as admin we may not be able to get system level access. To be honest that is the level I want...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

TrendMicro Q3 Security Report

October 24, 2012 Added by:Pierluigi Paganini

Trend Micro has released the 3Q 2012 SECURITY ROUNDUP that presents a worrying trend for malware growth which increased 483%. This includes cyber espionage malware and also destructive malicious agents targeting mainly the mobile world and in particular Google Android platform...

Comments  (0)

F66c1a87a8db2cb584b4e06e93a84ce3

Online Banking: A Trust Opportunity to (Re)gain?

October 09, 2012 Added by:Mikko Jakonen

How come banks are telling people to maintain their security better, without putting their OWN reputation and capabilities in line with the DIRECT consequences of the change paradigm towards ‘webalized’ approach we have witnessed for years, has now resulted as poor operational security...

Comments  (0)

B29000a16fad936906bbf3996fd7a593

Are You What You Tweet?

October 09, 2012 Added by:Online Privacy Foundation

The Online Privacy Foundation (OPF) encourages people to get online and consider all the great things social networking sites could do for them. But the evidence is growing that we need to think harder about how we share information online and question how that information is used...

Comments  (0)

B1c4090e84dcfac820a2b8ebe6eee82b

SMTP Dialects: How to Detect Bots Looking at SMTP Conversations

October 03, 2012 Added by:Gianluca Stringhini

We need new techniques to detect and block spam. Current techniques mostly fall in two categories: content analysis and origin analysis. Content analysis techniques look at what is being sent, and typically analyze the content of an email to see if it is indicative of spam...

Comments  (6)

5b4dab10939f37f8bee4017c584353fe

GrrCON: The Family Infosec Con

October 02, 2012 Added by:Philip Polstra

As always happens in a multi-track con, I was unable to attend every talk, so don't take offense if you spoke and your talk isn't listed here. I received many good reports from my students who attended different talks. None of my students complained about any bad talks...

Comments  (2)

E85787adcaf7bca10e799cfd1cfd08f1

Five Ways BYOD can Harm your Company

October 02, 2012 Added by:Michelle Drolet

It’s becoming more and more common for workers to store work-related documents on devices they bring to and from work each day. While this can be convenient--employees can access important documents at home or on the road--it also creates greater security risks for businesses...

Comments  (0)

E6fba550184963cb20ac46502a1fa1ee

Social Engineering: What the Heck Was I Doing? Part 1

September 26, 2012 Added by:Will Tarkington

The method I used for this particular tactic was to monitor the conversational rhythm. Then inject into it and take it over allowing me to guide the conversation. The skill set that allows you to walk into a conversation and take it over can’t be understated...

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Insights from Top CSOs: 100 Percent Concerned About Spear-Phishing

September 18, 2012 Added by:Jason Clark

Today’s phishing attacks are slow-and-low for evasion, highly targeted and look legitimate. Malware is increasingly delivered via an embedded URL which might not be live until days after the email is sent. Many of the CSOs also received variants of spear-phishing via SMS during the meeting...

Comments  (18)

03b2ceb73723f8b53cd533e4fba898ee

2012 Norton Cybercrime Report Presents a Worrisome Scenario

September 06, 2012 Added by:Pierluigi Paganini

With 556 million of victims per year, 2 of 3 adults have been victims of online crime in their lifetime, with a total economic loss of 110 Billion and an average cost per victim of $197. The trend demonstrates the need to put in place a massive awareness campaign...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Four Defendants Charged in Credit Card Skimming Scheme

August 21, 2012 Added by:Headlines

Four men were arrested for their roles in an identity theft scheme involving the theft of credit card numbers used to fraudulently purchase fuel at gas stations in order to be sold, distributed, or otherwise used by the defendants in order to obtain criminal proceeds...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Open Source Security Tools You Could Be Using

August 17, 2012

Jeff Bardin, a Principal at Treadstone 71 LLC, shared a variety of open source tools that businesses and consumers can use can for “espionage, competitive intelligence, and intellectual property” purposes. Check out this video to find out more about these tools and what they can do...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Student Pleads Guilty to Counterfeiting Coupons on the Internet

August 07, 2012 Added by:Headlines

In addition to creating and disseminating fake coupons, Henderson also wrote tutorials and created templates he posted online and that provided instructions for creating counterfeit coupons using their own computers. Henderson’s scheme caused retailers and manufacturers to lose approximately $900,000....

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Facebook, the Poisoned Network: 83 Million Questionable Profiles

August 03, 2012 Added by:Pierluigi Paganini

There are bots creating a significant number of fake profiles, which are managed by machines capable of interacting with each other and with real users, thus changing the "sentiment" and "conversation" on a large-scale, as well as altering the social graph to preclude meaningful correlations of data...

Comments  (2)

Page « < 2 - 3 - 4 - 5 - 6 > »