Social Engineering

Social Engineering | News, how-tos, features, reviews, and videos

A fishing lure with multiple hooks baits a binary stream. [fraud / phishing / social engineering]
hacker linkedin scam romance scam on social media phishing heart

phishing threat

What are phishing kits? Web components of phishing attacks explained

A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.

podcast 3x16 2

Episode 4: Reduce SOC burnout

Episode 4 - Listen to the podcast to learn more about the expanding threat landscape and how security leaders can reduce SOC burnout and enable security teams to be proactive and preventive threat hunters with a modern threat...

A fishing lure with multiple hooks baits a binary stream. [fraud / phishing / social engineering]

How to prepare for an effective phishing attack simulation

Here's what users need to know about phishing attacks before you send out a test email.

podcast 3x16 2

Episode 2: Empowering employees to be secure and productive

Episode 2: When it comes to protecting your business, security is a team sport. Criminal hackers –increasingly sophisticated and persistent – are playing offense, trying to find weak spots to breach an organization. And everyone in...

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

malicious email with skull and crossbones

14 tips to prevent business email compromise

Criminals fool victims into clicking on malicious links or assisting in financial theft by sending emails that mimic real senders and real companies. Here's how to stop BEC.

phishing threat

8 types of phishing attacks and how to identify them

Phishing comes in many forms, from spear phishing, whaling and business-email compromise to clone phishing, vishing and snowshoeing. Here's how to recognize each type of phishing attack.

Phishing attack   >   A fish hook hover above binary code with a caution triangle.

9 top anti-phishing tools and services

Some of these solutions will help find and stop phishing emails before they can cause damage, while others will find phishers fraudulently using your business's brand.

A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

Christina Quaine, CISO, SVP Technology Operations, AvidXchange, Inc.

CISO Q&A: How AvidXchange manages COVID-related threats and risk

Like many CISOs, Christina Quaine's team is supporting the payment processor's work-at-home employees and managing internal pandemic-specific risks. It also helps its mid-market customers meet new security challenges.

A pattern of Twitter-like bird icons and binary code is broken / breached / hacked.

Twitter hack raises alarm among government officials, security experts

The recent account takeover attack underscores how Twitter and other social platforms have become a critical component of political systems worldwide.

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world

Twitter VIP account hack highlights the danger of insider threats

The account compromise raises questions about Twitter's controls. Experts weigh in on best practices for mitigating risk from malicious or accidental insider threats.

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world

What is pretexting? Definition, examples and prevention

Pretexting is form of social engineering in which an attacker comes up with a story to convince a victim to give up valuable information or access to a service or system.

Failure frustration anger user man worker

6 hard truths security pros must learn to live with

Crafty hackers, unwitting users, a relentless workload — working in IT security is all about accepting this as business as usual and pushing forward anyway.

Cybersecurity  >  Email security threats, such as phishing

How Abnormal Security combats business email compromise

Abnormal Security analyzes work relationships, language patterns to spot compromised accounts and stop them from sending mail.

An unknown number calls a mobile phone amid pixelated data.

Vishing explained: How voice phishing attacks scam victims

Vishing (voice phishing) is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone.

COVID-19 coronavirus scam alert

8 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.

Smishing  >  A woman looks at her mobile phone in horror when receiving a malicious SMS text message

What is smishing? How phishing via text message works

Don't let the cute name fool you, smishing is a cyberattack that uses misleading text messages to trick victims into sharing valuable information, installing malware, or giving away money.

Load More