Social Engineering

Social Engineering news, information, and how-to advice

crime scence police tape
00 title awareness training

facebook logo large

Malicious images on Facebook lead to Locky Ransomware

Researchers have discovered an attack that uses Facebook Messenger to spread Locky, a family of malware that has quickly become a favorite among criminals. The Ransomware is delivered via a downloader, which is able to bypass...

hacker, hackers, hacking

Suspected Russian hackers target US think tanks after election

Hours after Donald Trump won the presidential election, a suspected Russian cyberespionage team was blamed for targeting several U.S. think tanks with phishing emails designed to fool victims into installing malware.

Election 2016 teaser - Republican vs Democrat

Salted Hash Live Blog – Election Day 2016

Salted Hash will be providing continuous coverage of today’s election. This year’s election is one of the first in living memory where the topic of hacking isn’t just a passive subject – it’s a reality. Throughout 2016, someone (the...

black belt karate

Cyber self-defense for kids (and parents too)

Today is the last day of national cyber security awareness month, but not too late for Ben Rothke, CISSP, QSA, Senior Security Consultant, Herjavec Group to provide some tips for parents and children.

windows server download update install

How Windows Server 2016 is tackling security

Windows Server 2016 could be a generational shift in security on par with Bill Gates’ introduction of Trustworthy Computing in 2002.

Each meeting space at Axxess is designed to reflect the cultures of a different continent.

Bringing cyber awareness, big league

Developing a corporate culture around cyber security from the board room to the end user

red blue tools

Best tools for red and blue teams are methodology, experience

Since the tools vary based on environment, it's the skills and know-how that red/blue teams need most

00 intro

Not so startling revelations of how a hacker broke in

These 10 ways are becoming all too common approaches, but yet users still fall for them.

colorful illustration of 4 fish swimming in teal water

Treasures attackers look for in the sea of email

Which swimmers can be trusted in the sea of emails exchanged every day put businesses at risk

01 intro myth

Security myths that can make you laugh… or cry

To help organizations cut through the noise to focus on improving security structures, security experts identify industry myths and provide suggestions to avoid falling for them. 

candy strangers

Five social engineering scams employees still fall for

You’ve trained them. You’ve deployed simulated phishing tests. You’ve reminded your employees countless times with posters and games and emails about avoiding phishing scams. Still, they keep falling for the same ploys they’ve been...

stock exchange share prices on an electronic display board stock market wall street stock ticker bo

Investment fund loses $6 million in BEC scam, suspends operations

A lawsuit filed on Friday by Tillage Commodities Fund alleges that SS&C Technology showed an egregious lack of diligence and care, when they fell for an email scam that ultimately led to hackers in China looting $5.9 million. Tillage...

central station standing

Awareness training: How much is too much?

The goal of security awareness training is to help employees recognize and avoid security risks. The key, experts say, is to make them skeptical but not operate in a “constant state of distrust.”

rio 2016 olympics logo rowing

Russian spies blamed for WADA hack, leaked documents confirm drug exemptions

On Tuesday, a group calling itself Fancy Bear, and claiming association with Anonymous, said they've hacked the World Anti-Doping Agency, and offered drug-screening results as proof. Only, the leaked documents don't contain...

classroom training

Is your security awareness training program working?

The metrics to use to determine where to make improvements in security awareness training


New tech can help catch spearphishing attacks

Highly-targeted spearphishing attacks slip past spam and anti-virus filters, but new approaches that look for more subtle patterns can help reduce the threat

Phishing trends

What is phishing success?

A recent article asking the question to security professionals seemed to miss the mark, and raises more questions than it answers.

mark cuban

Mark Cuban's new app leaves messages in the dust, not the cloud

'Dust' enables people to send private, encrypted, self-destructing text messages.

Load More