Social Engineering

Social Engineering | News, how-tos, features, reviews, and videos

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world
An unknown number calls a mobile phone amid pixelated data.

coronavirus closed for business surgical mask bby tim mossholder via unsplash .artistgndphotographe

What your business can do about the coronavirus ... right now

The Covid-19 crisis is the Black Swan event of our lifetime. Here's how to hold it all together (while keeping employees apart).

Social media threat / danger / risk >  Text bubbles interact, one bearing skull + crossbones

Social engineering explained: How criminals exploit human behavior

Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data.

Fraud / deception / social engineering  >  A wolf in sheep's clothing in a binary environment.

10 signs you're being socially engineered

Scammers will try to trick you and your organization's users into giving up credentials or other sensitive date. Be skeptical if you see any of these signs.

cybersecurity controls

The 5 CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first.

Mastery of technology skills + knowledge.

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

CSO  >  high-value targets  >  binary targeting of executives

Developing personal OPSEC plans: 10 tips for protecting high-value targets

Attackers are increasingly targeting executives and employees who have access to sensitive enterprise data. Here's how to protect those individuals with personal OPSEC plans.

Smishing, an SMS phishing attack / Vishing, a voice phishing attack by phone

Smishing and vishing: How these cyber attacks work and how to prevent them

Smishing and vishing are types of phishing attacks that try to lure victims via SMS message and voice calls. Both rely on the same emotional appeals employed in traditional phishing scams and are designed to drive you into urgent...

CSO > wolf in sheeps clothing / fraud / identity theft / social engineering

Famous social engineering attacks: 12 crafty cons

This rogues gallery of social engineering attack examples made headlines by taking advantage of human nature.

business intelligence crowd binary virtual world

How attackers identify your organization's weakest links

Understanding the techniques and tools attackers use in targeted phishing attacks.

6 handling email phishing

Business email compromise: The odds of being a victim are increasing

Given the growth over the last few years in BEC and EAC fraud, businesses should educate employees about the risks involved and red flags of this activity.

CSO > Invalidated cyber insurance

Does your cyber insurance cover social engineering? Read the fine print

Some cyber insurance policies will pay only a small fraction of damages if an attacker used social engineering. Here's how to estimate the risk.

A school of barracuda in the ocean.

Review: SlashNext is like shooting phish in a barrel

SlashNext is a dedicated platform for combating modern phishing attacks. It does that one thing and it does it very well.

patching against ransomware

The three most important ways to defend against security threats

Patching, security training programs and password management will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.

deepfakes fake news unreal doctored malicious personal attack video audio

Doctored Jim Acosta video shows why fakes don’t need to be deep to be dangerous

White House promotion of an allegedly doctored press conference video shows how "shallow fakes" can manipulate opinion.

a clock half-submerged in water

Cyber security relics: 4 older technologies still plaguing the infosec world

Understanding the issues of the past can help us be better equipped to deal with seemingly new issues in the present.

login password - user permissions - administrative control

Using social media for authentication: 3 pitfalls to avoid

Logging into business systems with social accounts comes with certain risks. Here's what you need to know.

Instagram post by CNN showing the CNN Situation Room studio

Scammers pose as CNN's Wolf Blitzer, target security professionals

Here's an interesting, if not outright comical, story for those of you just coming back to work after a long Labor Day weekend. Scammers are pretending to be a well-known CNN anchor and offering serious cash to anyone looking to be a...

1 weakest link broken rusted chain security breach hacked

10 topics every security training program should cover

A thorough end-user education program is a necessary weapon in the battle to protect your perimeter. These 10 topics are the baseline of what to include in an awareness training program.

Load More
You Might Also Like