Social Engineering

Social Engineering news, information, and how-to advice

valentine hero
01 boring

email pet peeves

In hindsight, preparing for security in 2017

What experts learn from looking back at 2016

fake lies pinocchio

What fake news means for IT—and how IT security can help fight it

The debate over fake news is roiling the political world, but elements of it look very familiar to tech veterans—and represent a potentially new attack vector that IT needs to worry about.


Increasing the cybersecurity workforce won't solve everything

Many organizations focus on technology to solve their security woes, while desperately trying to hire more security practitioners. But there are other ways to address social cybersecurity challenges. This article discusses the recent...

phishing threat

Phishing email scams 108 government employees, 756,000 people affected by breach

On Friday, The LA County Chief Executive Office issued a public notice that 756,000 Californians were going to be receiving breach notification letters, after a single Phishing email scammed more than one hundred county employees. The...

ransom lights

The rise of ransomware-as-a-service

Ransomware is a lucrative, growing business for online criminals. Stu Sjouwerman from KnowBe4 explains why

crime scence police tape

2016: A reflection of the year in cybercrime

A look back at 2016 predictions in cyber crime and how it all actually played out.

00 title awareness training

Does security awareness training need a new, stronger name?

Security awareness training can help change the security culture through ongoing attention on relevant topics like social engineering. Nevertheless, stale, old, awareness material certainly doesn’t help and too many programs keep...

facebook logo large

Malicious images on Facebook lead to Locky Ransomware

Researchers have discovered an attack that uses Facebook Messenger to spread Locky, a family of malware that has quickly become a favorite among criminals. The Ransomware is delivered via a downloader, which is able to bypass...

hacker, hackers, hacking

Suspected Russian hackers target US think tanks after election

Hours after Donald Trump won the presidential election, a suspected Russian cyberespionage team was blamed for targeting several U.S. think tanks with phishing emails designed to fool victims into installing malware.

Election 2016 teaser - Republican vs Democrat

Salted Hash Live Blog – Election Day 2016

Salted Hash will be providing continuous coverage of today’s election. This year’s election is one of the first in living memory where the topic of hacking isn’t just a passive subject – it’s a reality. Throughout 2016, someone (the...

black belt karate

Cyber self-defense for kids (and parents too)

Today is the last day of national cyber security awareness month, but not too late for Ben Rothke, CISSP, QSA, Senior Security Consultant, Herjavec Group to provide some tips for parents and children.

windows server download update install

How Windows Server 2016 is tackling security

Windows Server 2016 could be a generational shift in security on par with Bill Gates’ introduction of Trustworthy Computing in 2002.

Each meeting space at Axxess is designed to reflect the cultures of a different continent.

Bringing cyber awareness, big league

Developing a corporate culture around cyber security from the board room to the end user

red blue tools

Best tools for red and blue teams are methodology, experience

Since the tools vary based on environment, it's the skills and know-how that red/blue teams need most

00 intro

Not so startling revelations of how a hacker broke in

These 10 ways are becoming all too common approaches, but yet users still fall for them.

colorful illustration of 4 fish swimming in teal water

Treasures attackers look for in the sea of email

Which swimmers can be trusted in the sea of emails exchanged every day put businesses at risk

01 intro myth

Security myths that can make you laugh… or cry

To help organizations cut through the noise to focus on improving security structures, security experts identify industry myths and provide suggestions to avoid falling for them. 

candy strangers

Five social engineering scams employees still fall for

You’ve trained them. You’ve deployed simulated phishing tests. You’ve reminded your employees countless times with posters and games and emails about avoiding phishing scams. Still, they keep falling for the same ploys they’ve been...

Load More
You Might Also Like