Social Engineering

Social Engineering | News, how-tos, features, reviews, and videos

SMS phishing / smishing  >  Mobile phone displays text bubble with skull + crossbones
trojan horse malware virus binary by v graphix getty

A pattern of Twitter-like bird icons and binary code is broken / breached / hacked.

Musk’s Twitterverse and the future of misinformation

Security influencers weigh in with both concerns and curiosity over the future of the social network.


Chinese APT group Mustang Panda targets European and Russian organizations

Latest campaigns by Mustang Panda highlight the threat actor's versatility in terms of the tools and techniques it is able to use.

Phishing attack   >   A fish hook hover above binary code with a caution triangle.

10 top anti-phishing tools and services

Some of these solutions will help find and stop phishing emails before they can cause damage, while others will find phishers fraudulently using your business's brand.

A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? Examples, types, and techniques

Phishing is a type of cyberattack that uses disguised email to trick the recipient into giving up information, downloading malware, or taking some other desired action.

Social engineering  >  Laptop user with horns manipulates many social media accounts

Meta, Apple emergency data request scam holds lessons for CISOs

Fake requests from law enforcement gave cybercriminals access to sensitive customer data. It's a signal for CISOs to work with business to review and update processes for these requests.

phishing fishing lure bait binary hack security breach

What is spear phishing? Examples, tactics, and techniques

Spear phishing is a targeted email attack purporting to be from a trusted sender. Learn how to recognize—and defeat—this type of phishing attack.

A hand controls a small marionette. [control / manipulation / social engineering]

5 old social engineering tricks employees still fall for, and 4 new gotchas

Despite all the training and warnings, people still fall for these simple social engineering scams. What's worse, cybercriminals continue to come up with new ones.

The shadow of hand unsettlingly hovers over a keyboard.

FBI: Victims lost nearly $7 billion to cybercrime in 2021

New statistics from the FBI show that more than 847,000 complaints of suspected internet-based crime were made in the past year.

newspaper on fire inherit it mess fire risk alert disaster data center network room by elijah odonn

8 IT security disasters: Lessons from cautionary examples

An attack needs to really stand out to earn the name "disaster."

Social engineering / social media security / privacy breach / fraud

Strangest social engineering attacks of 2021

Criminal gangs are getting more creative with their social engineering scams as organizations continue to struggle to defend against them.

Phishing attack   >   A fish hook hover above binary code with a caution triangle.

Facebook and Microsoft are the most impersonated brands in phishing

Phishing pages impersonating Facebook and Microsoft contributed a little more than 25% of all phishing pages analyzed in a new report by Vade, while financial organizations comprised the hardest-hit sector overall.

ransomware attack

Ransomware is top cyberattack type, as manufacturing gets hit hardest

Ransomware was the number one attack type in 2021 as phishing and vulnerability exploits were top infection vectors, according to the IBM X-Force Threat Intelligence Index.

Fraud / deception / social engineering  >  A wolf in sheep's clothing in a binary environment.

Social engineering: Definition, examples, and techniques

Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. Train yourself to spot the signs.

hot and cold fire and ice clash temperature

7 hot cybersecurity trends (and 2 going cold)

Is that security trend hot or not? From tools and technologies to threats and tactics, the numbers don't lie.

targeted holiday attacks  >  a red bow impaled by a hook, surrounded by abstract binary code

Security lessons from 2021 holiday shopping fraud schemes

Here are four ways fraudsters targeted the 2021 shopping period with insight into how retailers can prevent and defend against exploitation.

cybersecurity controls

The 7 CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first.

CW > Microsoft Store  / abstract download

Sideloading attacks explained: How a malicious app can bring down a business

A new sideloading malware campaign targeting Windows uses phishing and social engineering tactics that can be difficult for users to spot.

email security lock breach protocol by microstockhub getty

9 cloud and on-premises email security suites compared

These email security suites have evolved to keep pace with email-enabled threats.

Load More
You Might Also Like