Social Engineering

Social Engineering news, information, and how-to advice

voice of it
new york times building

phishing

How do you measure success when it comes to stopping Phishing attacks?

What's considered a win when it comes to Phishing? This question was posed to IT workers and non-executive types earlier this month, and everyone had a different opinion on the topic. The general feeling among defenders was that a...

free wifi

10 year-old teaches hackers a valuable lesson in privacy

Evan Robertson, age 10, took a science fair project and turned it into a valuable lesson in privacy earlier this month at rootz Asylum, a kids-only gathering at DEF CON where children can learn about security in a safe, encouraging...

071916blog welcome to las vegas sign

Salted Hash Rehashed: Vegas Adventures (Part II)

Welcome to this week's second installment of Rehashed. Today's post has a quick recap of the shenanigans that took place earlier this month in Las Vegas, along some updated information and additional insight that didn't appear in our...

social engineering hp
Q&A

How well does social engineering work? One test returned 150%

A conversation with a white hat hacker

old combine farming great depression dust bowl combine harvestor antique 000003220203

Mobile pharming – same attacks – different seeds

I recently wrote a blog on mobile phishing titled: Mobile phishing – same attacks – different hooks. There was so much feedback that I’ve decided to a write a few more posts around mobile security differences. Since I’ve already...

web app puzzle

5 more critical IT policies you should have in place

In this article we cover part 2 of 10 IT policies every organization should have.

video

Social engineering tricks and why CEO fraud emails work

At the Black Hat conference in Las Vegas, CSO’s Steve Ragan talks with Stephanie Carruthers, owner of Snow Offensive Security, about why business email compromise (aka CEO fraud) works so well against companies. She also discusses...

dead letter office

Researcher releases DNS Greylisting tool for Phishing defense

At the BSides Las Vegas conference on Wednesday, a hacker by the name of Munin, and his research partner Nik LaBelle, are releasing a tool and giving a talk on an interesting concept - DNS Greylisting. The idea isn't new, but how the...

mobile phishing

Mobile phishing – same attacks – different hooks

I spent the last two weeks talking with CISOs, application developers, mobility experts and IoT thought leaders like SRI’s Dr. Ulf Lindqvist. One thing was for certain – mobile is receiving a lot of attention from the...

ransomware locked computer stock image cropped

Report: Only 3 percent of U.S. companies pay attackers after ransomware infections

Almost half of all companies have been the victims of a ransomware attack during the past 12 months, but 97 percent of affected U.S. companies did not pay the ransom, according to a new report.

click fraud

Interpol arrests Nigerian email scammer who swindled $60 million

Interpol has arrested a top Nigerian email scammer who stole more than $60 million by tricking businesses into handing over funds.

streetsweeper

Time to clean up our cybersecurity streets

By not putting good security practices in place at your business, you're increasing risk for all businesses. It's time to work together to clean up our (cyber) streets.

iphone locked

Apple devices held for ransom, rumors claim 40M iCloud accounts hacked

Since February, a number of Apple users have reported locked devices displaying ransom demands written in Russian. Earlier this week, a security professional posted a message to a private email group requesting information related a...

security phishing hook

Phishing scam focuses on the basics to harvest business credentials

Criminals are using basic CSS and HTML to scam victims out of their credentials, and in some cases, their phone numbers too. The Phishing campaign is driven by an easily customized kit that uses blurred images as a lure.

hollywood sign

Second man pleads guilty of hacking entertainment industry celebrities

A second man has pleaded guilty to using a phishing scheme to get access to private and sensitive videos and photographs of people in the entertainment industry in Los Angeles.

Calendars and keys

Salted Hashed Rehashed: The weekly news recap for July 1, 2016

Welcome to the weekly recap of news and other interesting items. This week's installment of Rehashed kicks off the month of July, and will be the start of a long weekend for many of us here in the U.S. Today we’re talking about...

phishing login

Broken Phishing scam targets several tech journalists

On Saturday, Salted Hash received a Phishing email from a PR contact (the second one this year) that was targeting corporate credentials. Unlike the previous Phishing email received from a professional contact, this one was poorly...

The best free weapon to fight phishing fraud

How to identify and recognize the best weapon in your arsenal to fight phishing emails

Load More