Social Engineering

Social Engineering news, information, and how-to advice

peeling back good times ahead bright future

submarine periscope 101722825

China continues to steal high-tech trade secrets

China continues to steal trade secrets. Six were arrested and seven charged with theft of Trelleborg's dual-use undersea technology.

money ransom

Ransomware damages rise 15X in 2 years to hit $5 billion in 2017

Ransomware damage costs are expected to hit $5 billion in 2017. To keep from becoming a victim, implement these six cybersecurity strategies.

phishing threat

Be wary of fake WannaCry fixes

When the WannaCry malware hit, many users were scrambling for fixes -- but some of the proffered solutions were actually just more malware, in disguise

three check marks blackboard list

Wanna stop WannaCrypt? Don't pay ransoms, backup data, and train employees

Top 3 things for CISOs and IT security teams to do in response to the WannaCry ransomware outbreak.

ransomware contained container

Your data has been kidnapped… now what?

If you think you're not a target for a cyberattack recent "ransomware" incidents should make you think again. Ransomware attacks are different than what most people perceive as a cyberattack. There's no theft of data or interest in...

mike rogers daniel coates mike pompeo

Worldwide threat assessment - The Director National Intelligence's view

Director National Intelligence presented his state of the global threats to the United States to the US Senate Select Committee on Intelligence.

phishing threat

Opinion: Some thoughts about Gizmodo's Phishing story

On Tuesday, Gizmodo published a story about how easy it was to get Trump Administration officials and associates to click a Phishing link. In order to do this, the Gizmodo Special Projects Desk developed a fake Google Docs email,...

email virus threat attack

BEC attacks have hit thousands, top $5 billion in losses globally

An updated advisory form the FBI says that Business Email Compromise (BEC) attacks have become a multi-billion-dollar scam worldwide, as criminals take advantage of lax policies and human nature. Victims include businesses both large...

img 20170504 151717 01 01

Healthy security cultures eat lots of phish

The Google Docs phishing scam was widespread across the internet recently. Thanks to regular phishing training and a strong security awareness culture, our company was spared and as the CISO, I didn't even have to drive the effort....

Gmail Google Mail

Recent Google Docs Phishing attack is a win for Blue Teams

On Wednesday afternoon, social media exploded with reports of a new Phishing attack targeting users of Google Docs. The attack was clever, centered on getting the victim to grant permissions to an application called Google Docs before...


Job seekers beware of recruiters

Paying a recruiter to find you a job could leave you the victim of a scam. Trending scams that could leave N00bs paying to stay unemployed.

medical records laptop doctor

Healthcare records for sale on Dark Web

A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them on the Dark Web for less than one cent per record.

call center indian

Social engineering scam targets Indian call center

Call centers in foreign countries can be at times ripe for social engineering. Most operators are supposed to stick to a script. Find out what happened when the operator left that script.

Resume with pen and laptop on desk

Job seekers on ZipRecruiter being targeted by scams via email and text

Right now, thousands of people are looking for a new job online. Some of them just want a change, but others are looking for a stable income to support themselves and their families. Scammers are targeting job seekers with precision,...

twitter logo eyeball

How to deal with the bot crisis on Twitter

You may have run into these bots a few times. What looks like an actual human being could have been a bot sending you Twitter spam...or even worse. One of the most nefarious examples is when Twitter bots are used to inflate traffic to...

phishing threat

Scammers Phishing for financial credentials on Twitter

Scammers are using Twitter as a vehicle to target people looking for customer support or asking general questions. They interject themselves into legitimate discussions, offering friendly chatter and a link that directs the target to...

People walking with airplane in background

Email security appears grounded as attacks continue to take flight

With clever cybercriminals finding creative new ways to get to users, has email security lost the battle to protect.

1 picture that key

7 sexy high-tech enterprise ‘surveillance engineering’ techniques that criminal hackers use

7 ways criminal hackers use high-tech surveillance—sometimes with a social engineering element—to tap into the enterprise to get the keys to your kingdom, or sensitive information.

Load More