Social Engineering

Social Engineering news, information, and how-to advice

w 2 form
w 2 form

facebook magnify

Security pros concerned about Facebook payment expansion

Facebook's Messenger app has allowed users to send money to friends using their debit cards since last spring, but recent reports indicate that Facebook may be considering a move into the retail payments space as well, following in...

breach title

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report contains bad news on multiple fronts, including click-through rates on phishing messages, how long it takes companies to detect breaches, and even whether companies spot the breaches at all....

mechanical fish phishing

Machine learning and social engineering attacks

In my last post I promised to use some real-world use cases from the recent Verizon Data Breach Digest report to illustrate potential ways that machine learning be can used to detect or prevent similar incidents in the future. For my...

crowd subway station

Two perspectives on social media for security leaders

Brian Reed and Ian Amit from ZeroFox blend two unique perspectives and experience on social media into an action plan for security leaders

bullseye darts

CEO targeted by fraud twice a month

Every couple of weeks or so, Tom Kemp's company gets hit by ever-more-sophisticated attempts to trick them out of large sums of money

w 2 form

Organizations still reporting stolen W-2 information

Since the end of 2015, criminals have gone on a rampage targeting W-2 information at organizations both large and small. So far this year, more than sixty organizations have come forward as victims of business email compromise (BEC)...

01 whaling title

10 whaling emails that could get by an unsuspecting CEO

Email security company Mimecast has shared a handful of real-life examples of fraud attempts targeted at the person in the corner office.

w 2 form

Latest tax-related data breach could affect employees and their children

Whiting-Turner, a Baltimore, Maryland-based construction company with contracts in both the private and federal sectors, says a recent security incident at a vendor hired to provide tax services could impact employees and their...

01 intro

Ever been in these social engineering situations?

A security consultant lays out various scenarios in hopes you are not the next victim.

hello barbie

Chinese scammers take Mattel to the bank, Phishing them for $3 million

Mattel, the popular toy maker behind Barbie and Hot Wheels, was the victim of a Phishing attack last year that nearly cost them $3 million. The only thing preventing a total loss was a mixture of timing and luck, because the day...

9 tips to prevent you from falling for a tax scam

Tyler Moffitt, senior threat research analyst at Webroot, provides tips for staying secure this tax season.

police car in rear view mirror 000000773431

Drivers targeted by GPS-based Phishing scam

Police in Tredyffrin, Pennsylvania are warning drivers about a new scam that uses accurate GPS information. The messages being sent to drivers claim to be speeding tickets; and in order to lend legitimacy to the scam, they contain...

01 youth

Keeping your kids safe along with your network

Security pros talk about the lessons learned when dealing with kids and computers.

office temp

People are (still) the biggest security risks

Social engineering and ‘download this attachment’ scams are back – as if they ever left – and working better than ever, unfortunately.

w 2 form

Phishing attacks targeting W-2 data hit 41 organizations in Q1 2016

In the first quarter of 2016, more than three dozen businesses have been victimized by Phishing attacks targeting employee tax records. The scams have impacted organizations both large and small, playing on fear and basic human nature...

social engineering

Social engineering 101: 18 ways to hack a human [Infographic]

Hackers use these common tactics to prey on your humanity. Here's what you need to know to keep you, your users, and your business safe.

Syrian Electronic Army

Feds file charges against Syrian Electronic Army, add them to Most Wanted list

The FBI has added the Syrian Electronic Army to their Cyber's Most Wanted list, placing Ahmad Umar Agha (Th3Pr0), Firas Dardar (th3shad0w) in the top two slots. A third person, Peter "Pierre" Romar, was also charged along side the...

jennifer lawrence oscars

Celebgate: Social engineering used to steal celebrity nude photos

On Tuesday, the Department of Justice, U.S. Attorney’s Office, Central District of California announced that Ryan Collins, 36, of Lancaster, Pennsylvania, plead guilty to violation of the Computer Fraud and Abuse Act.

Load More