Social Engineering

Social Engineering news, information, and how-to advice

Symantec to CISOs: Watch for the 'mega-breach'

Company releases 2013 Internet Security Threat Report, warning organizations that phishing and watering hole attacks can bury them


Why you need to measure the right things in your incident reporting process to improve your security culture

Shape a successful culture of security with an approach that gives individuals a voice and uses smart measurements to guide action.

Impact of EA Games hack on Apple shows ripple effect of attacks

EA Games server hacked to redirect users to phishing page requesting Apple ID and password

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

Scammers use missing Malaysia Airlines plane news as online bait

People searching for news about the missing Malaysia Airlines plane are been warned to steer clear of a fake Facebook page which is designed to generate money for scammers.

Researchers discover credential-stealing Unix-based server botnet

As many as 25,000 servers have been infected simultaneously with backdoor Trojan used to steal credentials, send out spam, and redirect Web traffic

Experts warn against judging Firefox on poor Pwn2Own performance

Researchers at annual hackfest discover four previously unknown vulnerabilities, but experts say that may not necessarily make it the least secure browser

Thoughts on exploiting trust and targeting security's weakest link

Social engineering, including Phishing, is my favorite form of attack. Hands down, it's the most cost effective, and often the simplest method of cracking an organization's defenses. Socially-based attacks are near impossible to...

Cloud Computing eGuide

In this eGuide, CIO, Computerworld, and InfoWorld offer advice, tips, news, and predictions regarding cloud implementations in the coming year and beyond. Read on to learn how to make cloud work for your organization.

Malicious advertising offers broad reach and quick rewards for malware perpetrators

Dynamic, expanding advertising scene opening juicy targets for Internet bandits


12 terrific tech and security-related TED talks

From thoughts on the NSA spying controversy, to an explanation of how one presenter hacked her own online dating profile

Why companies need to check their handling of internal threats

New study indicates that security teams lack awareness regarding the seriousness of insider threats

Experts question security used in Target breach

Security experts determining whether third-party vendor had too much access to Target's point of sale systems

Why Projects Fail

CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.

Online love scams flourish around Valentine's Day

Online dating and romance sites are obviously popular and because of that, regardless of the millions of admonitions to watch out for con artists, they are also a growing favorite of heartless scammers.

Social engineering attack on GoDaddy and PayPal to blame in Twitter hijacking

Leverage. That's what the criminal had when he contacted Naoki Hiroshima. Until recently, he had one of the highly prized single letter Twitter profiles; his was @N, but now it's @N_is_stolen. The details of his story are posted to...

Government criticised for 'lack of action' on fake HMRC tax sites

Online self assesment tax deadline looms

Studies prove once again that users are the weakest link in the security chain

Are you concerned about cybercriminals infiltrating your network, or having your servers or PCs compromised by malware? If you're not you should be.

Why Projects Fail

CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.

Hacker groups embracing more effective tactics in targeted attacks

"Watering hole" attacks prove to be more effective alternative to phishing

EFF says staff was Phished by "state-aligned actors" in Vietnam

On Sunday, the Electronic Frontier Foundation (EFF) published a report on a recent Phishing campaign that's targeting its staffers. According to the foundation, analysis of the malware and origins of the messages tie them to "what...

Tech support scammers are targeting mobile users, researchers say

The US Federal Trade Commission also reported scams offering refunds for bad tech support service

How to rescue your PC from ransomware

Don't negotiate with e-terrorists. Be a hero and rescue your hostage PC.

Load More