Social Engineering
Social Engineering | News, how-tos, features, reviews, and videos
Sponsor Podcast in partnership with Microsoft
Episode 2: Empowering employees to be secure and productive
The 15 biggest data breaches of the 21st century
Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.
14 tips to prevent business email compromise
Criminals fool victims into clicking on malicious links or assisting in financial theft by sending emails that mimic real senders and real companies. Here's how to stop BEC.
8 types of phishing attacks and how to identify them
Phishing comes in many forms, from spear phishing, whaling and business-email compromise to clone phishing, vishing and snowshoeing. Here's how to recognize each type of phishing attack.
9 top anti-phishing tools and services
Some of these solutions will help find and stop phishing emails before they can cause damage, while others will find phishers fraudulently using your business's brand.
What is phishing? How this cyber attack works and how to prevent it
Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.
CISO Q&A: How AvidXchange manages COVID-related threats and risk
Like many CISOs, Christina Quaine's team is supporting the payment processor's work-at-home employees and managing internal pandemic-specific risks. It also helps its mid-market customers meet new security challenges.
Twitter hack raises alarm among government officials, security experts
The recent account takeover attack underscores how Twitter and other social platforms have become a critical component of political systems worldwide.
Twitter VIP account hack highlights the danger of insider threats
The account compromise raises questions about Twitter's controls. Experts weigh in on best practices for mitigating risk from malicious or accidental insider threats.
What is pretexting? Definition, examples and prevention
Pretexting is form of social engineering in which an attacker comes up with a story to convince a victim to give up valuable information or access to a service or system.
6 hard truths security pros must learn to live with
Crafty hackers, unwitting users, a relentless workload — working in IT security is all about accepting this as business as usual and pushing forward anyway.
How Abnormal Security combats business email compromise
Abnormal Security analyzes work relationships, language patterns to spot compromised accounts and stop them from sending mail.
Vishing explained: How voice phishing attacks scam victims
Vishing (voice phishing) is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone.
8 ways attackers are exploiting the COVID-19 crisis
Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.
What is smishing? How phishing via text message works
Don't let the cute name fool you, smishing is a cyberattack that uses misleading text messages to trick victims into sharing valuable information, installing malware, or giving away money.
Pharming explained: How attackers use fake websites to steal data
A pharming attack aims to redirect victims’ web traffic away from their intended destination to a website controlled by threat actors to harvest information and spread malware.
14 real-world phishing examples — and how to recognize them
How well do you know these crafty cons?
Beware malware-laden emails offering COVID-19 information, US Secret Service warns
Many of the emails take advantage of an unpatched, decades-old Microsoft Office vulnerability to deliver malware. Advice: Patch now.
How to protect yourself from coronavirus phishing threats
The worst disease of the century brings out the worst in people as phishing attacks increase to unprecedented levels. Here's how to spot and COVID-19 phishing attacks and five ways to avoid them.
-
White Paper
-
Sponsor Article
Sponsored -
Video/Webcast
Sponsored -
White Paper
-
White Paper