Social Engineering

Social Engineering news, information, and how-to advice

Phishing key

Symantec to CISOs: Watch for the 'mega-breach'

Company releases 2013 Internet Security Threat Report, warning organizations that phishing and watering hole attacks can bury them


Phishing

Financial firms and social media remain top Phishing targets

Kaspersky Labs says that nearly 30 percent of all Phishing attacks last year targeted financial institutions, second only to social networking Phishing attack campaigns, which accounted for nearly 36 percent of all attacks of this...

Why you need to measure the right things in your incident reporting process to improve your security culture

Shape a successful culture of security with an approach that gives individuals a voice and uses smart measurements to guide action.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

Impact of EA Games hack on Apple shows ripple effect of attacks

EA Games server hacked to redirect users to phishing page requesting Apple ID and password

Scammers use missing Malaysia Airlines plane news as online bait

People searching for news about the missing Malaysia Airlines plane are been warned to steer clear of a fake Facebook page which is designed to generate money for scammers.

Researchers discover credential-stealing Unix-based server botnet

As many as 25,000 servers have been infected simultaneously with backdoor Trojan used to steal credentials, send out spam, and redirect Web traffic

Experts warn against judging Firefox on poor Pwn2Own performance

Researchers at annual hackfest discover four previously unknown vulnerabilities, but experts say that may not necessarily make it the least secure browser

Logicalis eBook: SAP HANA: The Need for Speed

Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes

Thoughts on exploiting trust and targeting security's weakest link

Social engineering, including Phishing, is my favorite form of attack. Hands down, it's the most cost effective, and often the simplest method of cracking an organization's defenses. Socially-based attacks are near impossible to...

Malicious advertising offers broad reach and quick rewards for malware perpetrators

Dynamic, expanding advertising scene opening juicy targets for Internet bandits

Slideshow

12 terrific tech and security-related TED talks

From thoughts on the NSA spying controversy, to an explanation of how one presenter hacked her own online dating profile

Why companies need to check their handling of internal threats

New study indicates that security teams lack awareness regarding the seriousness of insider threats

2013 Cyber Risk Report

The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape.

Experts question security used in Target breach

Security experts determining whether third-party vendor had too much access to Target's point of sale systems

Online love scams flourish around Valentine's Day

Online dating and romance sites are obviously popular and because of that, regardless of the millions of admonitions to watch out for con artists, they are also a growing favorite of heartless scammers.

Social engineering attack on GoDaddy and PayPal to blame in Twitter hijacking

Leverage. That's what the criminal had when he contacted Naoki Hiroshima. Until recently, he had one of the highly prized single letter Twitter profiles; his was @N, but now it's @N_is_stolen. The details of his story are posted to...

Government criticised for 'lack of action' on fake HMRC tax sites

Online self assesment tax deadline looms

Internet Security Threat Report 2014

The Internet Security Threat Report (ISTR) provides an analysis of the year's global threat activity, based on data from the Symantec™ Global Intelligence Network.

Studies prove once again that users are the weakest link in the security chain

Are you concerned about cybercriminals infiltrating your network, or having your servers or PCs compromised by malware? If you're not you should be.

Hacker groups embracing more effective tactics in targeted attacks

"Watering hole" attacks prove to be more effective alternative to phishing

EFF says staff was Phished by "state-aligned actors" in Vietnam

On Sunday, the Electronic Frontier Foundation (EFF) published a report on a recent Phishing campaign that's targeting its staffers. According to the foundation, analysis of the malware and origins of the messages tie them to "what...

Tech support scammers are targeting mobile users, researchers say

The US Federal Trade Commission also reported scams offering refunds for bad tech support service

Load More