Social Engineering

Social Engineering news, information, and how-to advice

Phishing key
too close darwin award

hotel hp

Darkhotel expands targets, ups sophistication, leverages Hacking Team exploit

Darkhotel -- the elite spying group discovered luxury hotels' Wi-Fi networks last year -- is back with new targets, new defensive capabilities, and a new zero-day exploit courtesy of the Hacking Team leak

false identity

Ubiquiti Networks victim of $39 million social engineering attack

Ubiquiti Networks Inc in its SEC filings reveal they were the victim of a social engineering attack resulting in the loss of $39 million

1 title

Social Engineering: 6 commonly targeted data points that are poorly protected

Now in its sixth year, the Social Engineering village at DEF CON has always been an interesting location. Each year the village hosts talks and interactive lessons on human hacking, but the major draw is the Social Engineering Capture...

google drove logo

Google Drive phishing is back -- with obfuscation

If you have a Google account and a stranger sends you a link to a document on Google Drive, think twice before clicking -- it could be a phishing scam designed to harvest your Google credentials

Hacking the Gibson in the movie “Hackers”

Modern APTs start at your corporate website

Have you ever though which role your corporate web applications may play in an APT attack against your company?

hackingteam hacked logo

Phishing attacks targeting government agencies linked to Hacking Team breach

In an alert on Friday, the FBI has issued a warning about an active phishing campaign targeting various government agencies in the U.S. The alert says that recent phishing emails and those from June targeted the Adobe Flash...

globe chess geopolitics

Cybersecurity and geopolitics are intertwined

Have you ever thought how the global economy and geopolitics influence cybersecurity and cybercrime? Some people may think that these are two completely different domains, however they are strongly and permanently related.

classroom ipads students teach learn lesson

How higher education deals with security threats

A culture of openness, two-factor authentication and incident response plans are some ways colleges and universities are dealing with security threats.

cash register

Think your website isn’t worth anything to hackers? Think again

Many people think that if their website is not an e-banking application or e-commerce platform, hackers have nothing to steal. They think that a hacked website can be quickly and easily repaired, and nobody will ever remember the...

lamp data

Common cybersecurity myths debunked

One of the greatest challenges for organizations attempting to address cybersecurity risks is the number of fundamental security myths that cause organizations to incorrectly assess threats.

Bank vault door

Banks get attacked four times more than other industries

According to a new report from Websense Security Labs, the average number of attacks against financial services institutions is four times higher than that of companies in other industries. In addition, a third of all initial-stage...

saudi embassy berlin

Leaked Saudi emails reveal new victim of Iranian hackers

Documents published by WikiLeaks, sourced from the Saudi government, have revealed the country's Ministry of Foreign Affairs (MOFA) as a victim of the series of attacks in 2014 collectively called Operation Cleaver.

army artillary

Weaponized Word docs, spyware and malvertising sprouting in May

Very aggressive weaponized Word documents have been getting past standard defenses in May, according to a new report from security firm Invincea.

smartphone laptop

Report: Scam phone calls up 30%

Phone fraud aimed at finance and retail companies rose by 30 percent last year, according to a new analysis of several million calls by Pindrop Security.

gerhard eschelbeck

Google's new cybersecurity chief cooking up exciting projects

Meet Gerhard Eschelbeck, Google's VP of Security Engineering.

red bull mini

Red Bull scam will give your bank account wings

A scam email making the rounds offers to pay you to drive a Red Bull-decal adorned car. Sounds too good to be true? That's because it is

persoanl info form

Security checks that rely on PII put businesses and consumers at risk

The problem of using personal information as a security check has existed for more than a decade, but as the Internet grows and personal data becomes more easily accessible, should such information remain a key security resource?

IRS discloses breach, attackers used PII to clear security checks

On Tuesday, the Internal Revenue Service (IRS) disclosed a data breach that affects 100,000 taxpayers. In a statement on the matter, the IRS said that the attackers were able to access information through the "Get Transcript"...

Load More